Feb 9 07:03:21.547643 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 07:03:21.547656 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 07:03:21.547663 kernel: BIOS-provided physical RAM map: Feb 9 07:03:21.547667 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 07:03:21.547670 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 07:03:21.547674 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 07:03:21.547678 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 07:03:21.547682 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 07:03:21.547686 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000820e1fff] usable Feb 9 07:03:21.547689 kernel: BIOS-e820: [mem 0x00000000820e2000-0x00000000820e2fff] ACPI NVS Feb 9 07:03:21.547694 kernel: BIOS-e820: [mem 0x00000000820e3000-0x00000000820e3fff] reserved Feb 9 07:03:21.547698 kernel: BIOS-e820: [mem 0x00000000820e4000-0x000000008afccfff] usable Feb 9 07:03:21.547701 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 9 07:03:21.547705 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 9 07:03:21.547710 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 9 07:03:21.547715 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 9 07:03:21.547719 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 9 07:03:21.547723 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 9 07:03:21.547726 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 07:03:21.547731 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 07:03:21.547735 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 07:03:21.547738 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 07:03:21.547743 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 07:03:21.547747 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 9 07:03:21.547751 kernel: NX (Execute Disable) protection: active Feb 9 07:03:21.547755 kernel: SMBIOS 3.2.1 present. Feb 9 07:03:21.547760 kernel: DMI: Supermicro X11SCM-F/X11SCM-F, BIOS 1.9 09/16/2022 Feb 9 07:03:21.547764 kernel: tsc: Detected 3400.000 MHz processor Feb 9 07:03:21.547768 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 07:03:21.547772 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 07:03:21.547776 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 07:03:21.547781 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 9 07:03:21.547785 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 07:03:21.547789 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 9 07:03:21.547793 kernel: Using GB pages for direct mapping Feb 9 07:03:21.547797 kernel: ACPI: Early table checksum verification disabled Feb 9 07:03:21.547802 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 07:03:21.547806 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 07:03:21.547811 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 9 07:03:21.547815 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 07:03:21.547821 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 9 07:03:21.547825 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 9 07:03:21.547831 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 9 07:03:21.547835 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 07:03:21.547840 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 07:03:21.547844 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 07:03:21.547849 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 07:03:21.547853 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 07:03:21.547858 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 07:03:21.547862 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 07:03:21.547868 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 07:03:21.547872 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 07:03:21.547877 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 07:03:21.547881 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 07:03:21.547886 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 07:03:21.547890 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 07:03:21.547895 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 07:03:21.547899 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 07:03:21.547904 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 07:03:21.547909 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 9 07:03:21.547914 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 07:03:21.547918 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 07:03:21.547923 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 07:03:21.547927 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 9 07:03:21.547932 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 07:03:21.547936 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 07:03:21.547941 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 07:03:21.547946 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 07:03:21.547951 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 07:03:21.547955 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 9 07:03:21.547960 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 9 07:03:21.547964 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 9 07:03:21.547969 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 9 07:03:21.547973 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 9 07:03:21.547978 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 9 07:03:21.547983 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 9 07:03:21.547987 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 9 07:03:21.547992 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 9 07:03:21.547996 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 9 07:03:21.548001 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 9 07:03:21.548005 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 9 07:03:21.548010 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 9 07:03:21.548014 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 9 07:03:21.548019 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 9 07:03:21.548024 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 9 07:03:21.548029 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 9 07:03:21.548033 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 9 07:03:21.548038 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 9 07:03:21.548042 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 9 07:03:21.548046 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 9 07:03:21.548051 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 9 07:03:21.548055 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 9 07:03:21.548060 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 9 07:03:21.548065 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 9 07:03:21.548070 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 9 07:03:21.548074 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 9 07:03:21.548079 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 9 07:03:21.548083 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 9 07:03:21.548088 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 9 07:03:21.548092 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 9 07:03:21.548097 kernel: No NUMA configuration found Feb 9 07:03:21.548101 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 9 07:03:21.548107 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 9 07:03:21.548111 kernel: Zone ranges: Feb 9 07:03:21.548116 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 07:03:21.548120 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 07:03:21.548125 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 9 07:03:21.548129 kernel: Movable zone start for each node Feb 9 07:03:21.548134 kernel: Early memory node ranges Feb 9 07:03:21.548138 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 07:03:21.548143 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 07:03:21.548147 kernel: node 0: [mem 0x0000000040400000-0x00000000820e1fff] Feb 9 07:03:21.548152 kernel: node 0: [mem 0x00000000820e4000-0x000000008afccfff] Feb 9 07:03:21.548157 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 9 07:03:21.548162 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 9 07:03:21.548166 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 9 07:03:21.548171 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 9 07:03:21.548175 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 07:03:21.548183 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 07:03:21.548188 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 07:03:21.548193 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 07:03:21.548198 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 9 07:03:21.548204 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 9 07:03:21.548209 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 9 07:03:21.548214 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 9 07:03:21.548219 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 07:03:21.548224 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 07:03:21.548229 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 07:03:21.548233 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 07:03:21.548239 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 07:03:21.548244 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 07:03:21.548249 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 07:03:21.548254 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 07:03:21.548258 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 07:03:21.548263 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 07:03:21.548268 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 07:03:21.548273 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 07:03:21.548278 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 07:03:21.548283 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 07:03:21.548288 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 07:03:21.548293 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 07:03:21.548298 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 07:03:21.548302 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 07:03:21.548307 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 07:03:21.548312 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 07:03:21.548317 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 07:03:21.548322 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 07:03:21.548327 kernel: TSC deadline timer available Feb 9 07:03:21.548332 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 07:03:21.548337 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 9 07:03:21.548342 kernel: Booting paravirtualized kernel on bare hardware Feb 9 07:03:21.548347 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 07:03:21.548352 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 07:03:21.548357 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 07:03:21.548362 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 07:03:21.548367 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 07:03:21.548372 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 9 07:03:21.548377 kernel: Policy zone: Normal Feb 9 07:03:21.548383 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 07:03:21.548388 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 07:03:21.548392 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 07:03:21.548397 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 07:03:21.548402 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 07:03:21.548407 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 9 07:03:21.548413 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 07:03:21.548418 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 07:03:21.548423 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 07:03:21.548428 kernel: rcu: Hierarchical RCU implementation. Feb 9 07:03:21.548433 kernel: rcu: RCU event tracing is enabled. Feb 9 07:03:21.548438 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 07:03:21.548443 kernel: Rude variant of Tasks RCU enabled. Feb 9 07:03:21.548448 kernel: Tracing variant of Tasks RCU enabled. Feb 9 07:03:21.548453 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 07:03:21.548458 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 07:03:21.548463 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 07:03:21.548468 kernel: random: crng init done Feb 9 07:03:21.548473 kernel: Console: colour dummy device 80x25 Feb 9 07:03:21.548478 kernel: printk: console [tty0] enabled Feb 9 07:03:21.548482 kernel: printk: console [ttyS1] enabled Feb 9 07:03:21.548487 kernel: ACPI: Core revision 20210730 Feb 9 07:03:21.548494 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 9 07:03:21.548516 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 07:03:21.548522 kernel: DMAR: Host address width 39 Feb 9 07:03:21.548527 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 07:03:21.548532 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 07:03:21.548550 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 9 07:03:21.548555 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 9 07:03:21.548560 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 07:03:21.548565 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 07:03:21.548569 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 07:03:21.548574 kernel: x2apic enabled Feb 9 07:03:21.548580 kernel: Switched APIC routing to cluster x2apic. Feb 9 07:03:21.548585 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 07:03:21.548590 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 07:03:21.548595 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 07:03:21.548599 kernel: process: using mwait in idle threads Feb 9 07:03:21.548604 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 07:03:21.548609 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 07:03:21.548614 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 07:03:21.548618 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 07:03:21.548624 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 07:03:21.548629 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 07:03:21.548634 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 07:03:21.548639 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 07:03:21.548643 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 07:03:21.548648 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 07:03:21.548653 kernel: TAA: Mitigation: TSX disabled Feb 9 07:03:21.548657 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 07:03:21.548662 kernel: SRBDS: Mitigation: Microcode Feb 9 07:03:21.548667 kernel: GDS: Vulnerable: No microcode Feb 9 07:03:21.548672 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 07:03:21.548677 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 07:03:21.548682 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 07:03:21.548687 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 07:03:21.548692 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 07:03:21.548697 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 07:03:21.548701 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 07:03:21.548706 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 07:03:21.548711 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 07:03:21.548716 kernel: Freeing SMP alternatives memory: 32K Feb 9 07:03:21.548720 kernel: pid_max: default: 32768 minimum: 301 Feb 9 07:03:21.548725 kernel: LSM: Security Framework initializing Feb 9 07:03:21.548730 kernel: SELinux: Initializing. Feb 9 07:03:21.548735 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 07:03:21.548740 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 07:03:21.548745 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 07:03:21.548750 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 07:03:21.548755 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 07:03:21.548760 kernel: ... version: 4 Feb 9 07:03:21.548765 kernel: ... bit width: 48 Feb 9 07:03:21.548769 kernel: ... generic registers: 4 Feb 9 07:03:21.548774 kernel: ... value mask: 0000ffffffffffff Feb 9 07:03:21.548779 kernel: ... max period: 00007fffffffffff Feb 9 07:03:21.548785 kernel: ... fixed-purpose events: 3 Feb 9 07:03:21.548790 kernel: ... event mask: 000000070000000f Feb 9 07:03:21.548794 kernel: signal: max sigframe size: 2032 Feb 9 07:03:21.548799 kernel: rcu: Hierarchical SRCU implementation. Feb 9 07:03:21.548804 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 07:03:21.548809 kernel: smp: Bringing up secondary CPUs ... Feb 9 07:03:21.548814 kernel: x86: Booting SMP configuration: Feb 9 07:03:21.548819 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 07:03:21.548824 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 07:03:21.548829 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 07:03:21.548834 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 07:03:21.548839 kernel: smpboot: Max logical packages: 1 Feb 9 07:03:21.548844 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 07:03:21.548849 kernel: devtmpfs: initialized Feb 9 07:03:21.548854 kernel: x86/mm: Memory block size: 128MB Feb 9 07:03:21.548858 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x820e2000-0x820e2fff] (4096 bytes) Feb 9 07:03:21.548863 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 9 07:03:21.548869 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 07:03:21.548874 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 07:03:21.548879 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 07:03:21.548884 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 07:03:21.548889 kernel: audit: initializing netlink subsys (disabled) Feb 9 07:03:21.548894 kernel: audit: type=2000 audit(1707462196.040:1): state=initialized audit_enabled=0 res=1 Feb 9 07:03:21.548898 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 07:03:21.548903 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 07:03:21.548908 kernel: cpuidle: using governor menu Feb 9 07:03:21.548914 kernel: ACPI: bus type PCI registered Feb 9 07:03:21.548918 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 07:03:21.548923 kernel: dca service started, version 1.12.1 Feb 9 07:03:21.548928 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 07:03:21.548933 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 07:03:21.548938 kernel: PCI: Using configuration type 1 for base access Feb 9 07:03:21.548943 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 07:03:21.548948 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 07:03:21.548952 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 07:03:21.548958 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 07:03:21.548963 kernel: ACPI: Added _OSI(Module Device) Feb 9 07:03:21.548968 kernel: ACPI: Added _OSI(Processor Device) Feb 9 07:03:21.548973 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 07:03:21.548978 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 07:03:21.548982 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 07:03:21.548987 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 07:03:21.548992 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 07:03:21.548997 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 07:03:21.549003 kernel: ACPI: Dynamic OEM Table Load: Feb 9 07:03:21.549007 kernel: ACPI: SSDT 0xFFFF91FF00213100 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 07:03:21.549012 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 07:03:21.549017 kernel: ACPI: Dynamic OEM Table Load: Feb 9 07:03:21.549022 kernel: ACPI: SSDT 0xFFFF91FF01AE3C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 07:03:21.549027 kernel: ACPI: Dynamic OEM Table Load: Feb 9 07:03:21.549032 kernel: ACPI: SSDT 0xFFFF91FF01A5C000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 07:03:21.549036 kernel: ACPI: Dynamic OEM Table Load: Feb 9 07:03:21.549041 kernel: ACPI: SSDT 0xFFFF91FF01A58800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 07:03:21.549046 kernel: ACPI: Dynamic OEM Table Load: Feb 9 07:03:21.549051 kernel: ACPI: SSDT 0xFFFF91FF0014B000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 07:03:21.549056 kernel: ACPI: Dynamic OEM Table Load: Feb 9 07:03:21.549061 kernel: ACPI: SSDT 0xFFFF91FF01AE5000 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 07:03:21.549066 kernel: ACPI: Interpreter enabled Feb 9 07:03:21.549071 kernel: ACPI: PM: (supports S0 S5) Feb 9 07:03:21.549076 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 07:03:21.549081 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 07:03:21.549085 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 07:03:21.549090 kernel: HEST: Table parsing has been initialized. Feb 9 07:03:21.549096 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 07:03:21.549101 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 07:03:21.549106 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 07:03:21.549110 kernel: ACPI: PM: Power Resource [USBC] Feb 9 07:03:21.549115 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 07:03:21.549120 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 07:03:21.549125 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 07:03:21.549130 kernel: ACPI: PM: Power Resource [WRST] Feb 9 07:03:21.549135 kernel: ACPI: PM: Power Resource [FN00] Feb 9 07:03:21.549140 kernel: ACPI: PM: Power Resource [FN01] Feb 9 07:03:21.549145 kernel: ACPI: PM: Power Resource [FN02] Feb 9 07:03:21.549150 kernel: ACPI: PM: Power Resource [FN03] Feb 9 07:03:21.549154 kernel: ACPI: PM: Power Resource [FN04] Feb 9 07:03:21.549159 kernel: ACPI: PM: Power Resource [PIN] Feb 9 07:03:21.549164 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 07:03:21.549229 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 07:03:21.549273 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 07:03:21.549315 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 07:03:21.549322 kernel: PCI host bridge to bus 0000:00 Feb 9 07:03:21.549366 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 07:03:21.549402 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 07:03:21.549438 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 07:03:21.549473 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 9 07:03:21.549529 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 07:03:21.549583 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 07:03:21.549632 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 07:03:21.549678 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 07:03:21.549720 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 07:03:21.549765 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 07:03:21.549807 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 9 07:03:21.549854 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 07:03:21.549897 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 9 07:03:21.549942 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 07:03:21.549984 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 9 07:03:21.550026 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 07:03:21.550070 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 07:03:21.550113 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 9 07:03:21.550153 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 9 07:03:21.550197 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 07:03:21.550237 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 07:03:21.550281 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 07:03:21.550321 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 07:03:21.550363 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 07:03:21.550407 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 9 07:03:21.550447 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 07:03:21.550491 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 07:03:21.550566 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 9 07:03:21.550606 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 07:03:21.550652 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 07:03:21.550694 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 9 07:03:21.550734 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 07:03:21.550777 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 07:03:21.550818 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 9 07:03:21.550857 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 9 07:03:21.550897 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 9 07:03:21.550937 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 9 07:03:21.550983 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 9 07:03:21.551024 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 9 07:03:21.551064 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 07:03:21.551109 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 07:03:21.551150 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 07:03:21.551196 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 07:03:21.551236 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 07:03:21.551284 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 07:03:21.551325 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 07:03:21.551370 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 07:03:21.551411 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 07:03:21.551457 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 9 07:03:21.551521 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 9 07:03:21.551581 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 07:03:21.551622 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 07:03:21.551668 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 07:03:21.551715 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 07:03:21.551755 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 9 07:03:21.551795 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 07:03:21.551839 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 07:03:21.551880 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 07:03:21.551927 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 07:03:21.551971 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 07:03:21.552014 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 9 07:03:21.552056 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 9 07:03:21.552098 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 07:03:21.552139 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 07:03:21.552188 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 07:03:21.552230 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 07:03:21.552274 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 9 07:03:21.552316 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 9 07:03:21.552357 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 07:03:21.552398 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 07:03:21.552440 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 07:03:21.552481 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 07:03:21.552566 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 07:03:21.552608 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 07:03:21.552655 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 9 07:03:21.552697 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 9 07:03:21.552739 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 07:03:21.552781 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 9 07:03:21.552823 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 9 07:03:21.552864 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 07:03:21.552905 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 07:03:21.552947 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 07:03:21.552994 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 07:03:21.553036 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 9 07:03:21.553081 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 07:03:21.553123 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 9 07:03:21.553167 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 07:03:21.553208 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 07:03:21.553249 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 07:03:21.553321 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 07:03:21.553383 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 07:03:21.553430 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 07:03:21.553472 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 9 07:03:21.553558 kernel: pci 0000:06:00.0: supports D1 D2 Feb 9 07:03:21.553601 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 07:03:21.553643 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 07:03:21.553683 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 07:03:21.553727 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 07:03:21.553771 kernel: pci_bus 0000:07: extended config space not accessible Feb 9 07:03:21.553820 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 07:03:21.553865 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 9 07:03:21.553910 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 9 07:03:21.553954 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 07:03:21.553999 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 07:03:21.554044 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 07:03:21.554090 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 07:03:21.554132 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 07:03:21.554175 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 07:03:21.554217 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 07:03:21.554224 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 07:03:21.554230 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 07:03:21.554236 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 07:03:21.554242 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 07:03:21.554247 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 07:03:21.554252 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 07:03:21.554257 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 07:03:21.554262 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 07:03:21.554267 kernel: iommu: Default domain type: Translated Feb 9 07:03:21.554272 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 07:03:21.554315 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 9 07:03:21.554360 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 07:03:21.554405 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 9 07:03:21.554412 kernel: vgaarb: loaded Feb 9 07:03:21.554418 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 07:03:21.554423 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 07:03:21.554428 kernel: PTP clock support registered Feb 9 07:03:21.554433 kernel: PCI: Using ACPI for IRQ routing Feb 9 07:03:21.554438 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 07:03:21.554443 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 07:03:21.554450 kernel: e820: reserve RAM buffer [mem 0x820e2000-0x83ffffff] Feb 9 07:03:21.554455 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 9 07:03:21.554460 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 9 07:03:21.554465 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 9 07:03:21.554470 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 9 07:03:21.554475 kernel: clocksource: Switched to clocksource tsc-early Feb 9 07:03:21.554480 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 07:03:21.554485 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 07:03:21.554490 kernel: pnp: PnP ACPI init Feb 9 07:03:21.554580 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 07:03:21.554623 kernel: pnp 00:02: [dma 0 disabled] Feb 9 07:03:21.554663 kernel: pnp 00:03: [dma 0 disabled] Feb 9 07:03:21.554703 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 07:03:21.554741 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 07:03:21.554780 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 07:03:21.554822 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 07:03:21.554859 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 07:03:21.554895 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 07:03:21.554933 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 07:03:21.554969 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 07:03:21.555005 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 07:03:21.555041 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 07:03:21.555081 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 07:03:21.555122 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 07:03:21.555160 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 07:03:21.555196 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 07:03:21.555232 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 07:03:21.555268 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 07:03:21.555304 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 07:03:21.555343 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 07:03:21.555383 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 07:03:21.555391 kernel: pnp: PnP ACPI: found 10 devices Feb 9 07:03:21.555396 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 07:03:21.555402 kernel: NET: Registered PF_INET protocol family Feb 9 07:03:21.555407 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 07:03:21.555412 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 07:03:21.555417 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 07:03:21.555424 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 07:03:21.555429 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 07:03:21.555434 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 07:03:21.555439 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 07:03:21.555445 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 07:03:21.555450 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 07:03:21.555455 kernel: NET: Registered PF_XDP protocol family Feb 9 07:03:21.555521 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 9 07:03:21.555565 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 9 07:03:21.555606 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 9 07:03:21.555649 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 07:03:21.555692 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 07:03:21.555736 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 07:03:21.555778 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 07:03:21.555820 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 07:03:21.555862 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 07:03:21.555906 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 07:03:21.555947 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 07:03:21.555988 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 07:03:21.556030 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 07:03:21.556071 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 07:03:21.556115 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 07:03:21.556156 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 07:03:21.556199 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 07:03:21.556240 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 07:03:21.556284 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 07:03:21.556326 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 07:03:21.556369 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 07:03:21.556410 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 07:03:21.556450 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 07:03:21.556496 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 07:03:21.556534 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 07:03:21.556571 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 07:03:21.556607 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 07:03:21.556643 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 07:03:21.556679 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 9 07:03:21.556715 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 07:03:21.556757 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 9 07:03:21.556798 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 07:03:21.556840 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 9 07:03:21.556879 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 9 07:03:21.556922 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 9 07:03:21.556961 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 9 07:03:21.557004 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 9 07:03:21.557046 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 9 07:03:21.557086 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 07:03:21.557127 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 9 07:03:21.557134 kernel: PCI: CLS 64 bytes, default 64 Feb 9 07:03:21.557140 kernel: DMAR: No ATSR found Feb 9 07:03:21.557145 kernel: DMAR: No SATC found Feb 9 07:03:21.557151 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 07:03:21.557191 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 07:03:21.557236 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 07:03:21.557278 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 9 07:03:21.557319 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 9 07:03:21.557361 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 9 07:03:21.557402 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 9 07:03:21.557444 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 9 07:03:21.557484 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 9 07:03:21.557528 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 9 07:03:21.557571 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 9 07:03:21.557613 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 9 07:03:21.557653 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 9 07:03:21.557694 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 9 07:03:21.557735 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 9 07:03:21.557776 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 9 07:03:21.557817 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 9 07:03:21.557858 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 9 07:03:21.557901 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 9 07:03:21.557942 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 9 07:03:21.557983 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 9 07:03:21.558025 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 9 07:03:21.558068 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 9 07:03:21.558112 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 9 07:03:21.558155 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 9 07:03:21.558199 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 07:03:21.558244 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 9 07:03:21.558290 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 9 07:03:21.558297 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 07:03:21.558303 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 07:03:21.558308 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 9 07:03:21.558314 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 9 07:03:21.558319 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 07:03:21.558325 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 07:03:21.558331 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 07:03:21.558376 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 07:03:21.558384 kernel: Initialise system trusted keyrings Feb 9 07:03:21.558389 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 07:03:21.558395 kernel: Key type asymmetric registered Feb 9 07:03:21.558400 kernel: Asymmetric key parser 'x509' registered Feb 9 07:03:21.558405 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 07:03:21.558411 kernel: io scheduler mq-deadline registered Feb 9 07:03:21.558417 kernel: io scheduler kyber registered Feb 9 07:03:21.558422 kernel: io scheduler bfq registered Feb 9 07:03:21.558464 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 9 07:03:21.558509 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 9 07:03:21.558551 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 9 07:03:21.558592 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 9 07:03:21.558634 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 9 07:03:21.558676 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 9 07:03:21.558723 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 07:03:21.558751 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 07:03:21.558756 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 07:03:21.558761 kernel: pstore: Registered erst as persistent store backend Feb 9 07:03:21.558767 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 07:03:21.558772 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 07:03:21.558777 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 07:03:21.558782 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 07:03:21.558789 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 9 07:03:21.558831 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 07:03:21.558838 kernel: i8042: PNP: No PS/2 controller found. Feb 9 07:03:21.558875 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 07:03:21.558913 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 07:03:21.558950 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T07:03:20 UTC (1707462200) Feb 9 07:03:21.558986 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 07:03:21.558994 kernel: fail to initialize ptp_kvm Feb 9 07:03:21.559000 kernel: intel_pstate: Intel P-state driver initializing Feb 9 07:03:21.559005 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 07:03:21.559011 kernel: intel_pstate: HWP enabled Feb 9 07:03:21.559016 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 07:03:21.559021 kernel: vesafb: scrolling: redraw Feb 9 07:03:21.559026 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 07:03:21.559031 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000d13ec440, using 768k, total 768k Feb 9 07:03:21.559036 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 07:03:21.559042 kernel: fb0: VESA VGA frame buffer device Feb 9 07:03:21.559048 kernel: NET: Registered PF_INET6 protocol family Feb 9 07:03:21.559053 kernel: Segment Routing with IPv6 Feb 9 07:03:21.559058 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 07:03:21.559063 kernel: NET: Registered PF_PACKET protocol family Feb 9 07:03:21.559068 kernel: Key type dns_resolver registered Feb 9 07:03:21.559073 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 07:03:21.559079 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 07:03:21.559084 kernel: IPI shorthand broadcast: enabled Feb 9 07:03:21.559089 kernel: sched_clock: Marking stable (1681479611, 1338904760)->(4438485540, -1418101169) Feb 9 07:03:21.559095 kernel: registered taskstats version 1 Feb 9 07:03:21.559100 kernel: Loading compiled-in X.509 certificates Feb 9 07:03:21.559105 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 07:03:21.559110 kernel: Key type .fscrypt registered Feb 9 07:03:21.559115 kernel: Key type fscrypt-provisioning registered Feb 9 07:03:21.559120 kernel: pstore: Using crash dump compression: deflate Feb 9 07:03:21.559126 kernel: ima: Allocated hash algorithm: sha1 Feb 9 07:03:21.559131 kernel: ima: No architecture policies found Feb 9 07:03:21.559136 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 07:03:21.559142 kernel: Write protecting the kernel read-only data: 28672k Feb 9 07:03:21.559147 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 07:03:21.559153 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 07:03:21.559158 kernel: Run /init as init process Feb 9 07:03:21.559163 kernel: with arguments: Feb 9 07:03:21.559168 kernel: /init Feb 9 07:03:21.559173 kernel: with environment: Feb 9 07:03:21.559179 kernel: HOME=/ Feb 9 07:03:21.559184 kernel: TERM=linux Feb 9 07:03:21.559189 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 07:03:21.559196 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 07:03:21.559202 systemd[1]: Detected architecture x86-64. Feb 9 07:03:21.559208 systemd[1]: Running in initrd. Feb 9 07:03:21.559213 systemd[1]: No hostname configured, using default hostname. Feb 9 07:03:21.559218 systemd[1]: Hostname set to . Feb 9 07:03:21.559224 systemd[1]: Initializing machine ID from random generator. Feb 9 07:03:21.559230 systemd[1]: Queued start job for default target initrd.target. Feb 9 07:03:21.559235 systemd[1]: Started systemd-ask-password-console.path. Feb 9 07:03:21.559240 systemd[1]: Reached target cryptsetup.target. Feb 9 07:03:21.559246 systemd[1]: Reached target paths.target. Feb 9 07:03:21.559251 systemd[1]: Reached target slices.target. Feb 9 07:03:21.559256 systemd[1]: Reached target swap.target. Feb 9 07:03:21.559261 systemd[1]: Reached target timers.target. Feb 9 07:03:21.559267 systemd[1]: Listening on iscsid.socket. Feb 9 07:03:21.559273 systemd[1]: Listening on iscsiuio.socket. Feb 9 07:03:21.559279 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 07:03:21.559284 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 07:03:21.559289 systemd[1]: Listening on systemd-journald.socket. Feb 9 07:03:21.559295 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Feb 9 07:03:21.559300 systemd[1]: Listening on systemd-networkd.socket. Feb 9 07:03:21.559305 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Feb 9 07:03:21.559310 kernel: clocksource: Switched to clocksource tsc Feb 9 07:03:21.559317 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 07:03:21.559322 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 07:03:21.559328 systemd[1]: Reached target sockets.target. Feb 9 07:03:21.559333 systemd[1]: Starting kmod-static-nodes.service... Feb 9 07:03:21.559338 systemd[1]: Finished network-cleanup.service. Feb 9 07:03:21.559344 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 07:03:21.559349 systemd[1]: Starting systemd-journald.service... Feb 9 07:03:21.559355 systemd[1]: Starting systemd-modules-load.service... Feb 9 07:03:21.559362 systemd-journald[267]: Journal started Feb 9 07:03:21.559388 systemd-journald[267]: Runtime Journal (/run/log/journal/af9e8d717b2b47aca3906b40cbd9d29c) is 8.0M, max 640.1M, 632.1M free. Feb 9 07:03:21.562200 systemd-modules-load[268]: Inserted module 'overlay' Feb 9 07:03:21.568000 audit: BPF prog-id=6 op=LOAD Feb 9 07:03:21.586499 kernel: audit: type=1334 audit(1707462201.568:2): prog-id=6 op=LOAD Feb 9 07:03:21.586528 systemd[1]: Starting systemd-resolved.service... Feb 9 07:03:21.635498 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 07:03:21.651498 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 07:03:21.651530 kernel: Bridge firewalling registered Feb 9 07:03:21.666055 systemd-modules-load[268]: Inserted module 'br_netfilter' Feb 9 07:03:21.679569 systemd[1]: Started systemd-journald.service. Feb 9 07:03:21.689542 systemd-resolved[270]: Positive Trust Anchors: Feb 9 07:03:21.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:21.689549 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 07:03:21.787721 kernel: audit: type=1130 audit(1707462201.690:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:21.787745 kernel: SCSI subsystem initialized Feb 9 07:03:21.787756 kernel: audit: type=1130 audit(1707462201.742:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:21.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:21.689569 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 07:03:21.943736 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 07:03:21.943757 kernel: audit: type=1130 audit(1707462201.817:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:21.943766 kernel: device-mapper: uevent: version 1.0.3 Feb 9 07:03:21.943780 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 07:03:21.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:21.690795 systemd[1]: Finished kmod-static-nodes.service. Feb 9 07:03:21.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:21.691141 systemd-resolved[270]: Defaulting to hostname 'linux'. Feb 9 07:03:22.048594 kernel: audit: type=1130 audit(1707462201.951:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:22.048611 kernel: audit: type=1130 audit(1707462202.003:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:22.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:21.742628 systemd[1]: Started systemd-resolved.service. Feb 9 07:03:22.103056 kernel: audit: type=1130 audit(1707462202.056:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:22.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:21.817648 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 07:03:21.911475 systemd-modules-load[268]: Inserted module 'dm_multipath' Feb 9 07:03:21.951857 systemd[1]: Finished systemd-modules-load.service. Feb 9 07:03:22.003778 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 07:03:22.056769 systemd[1]: Reached target nss-lookup.target. Feb 9 07:03:22.112077 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 07:03:22.133026 systemd[1]: Starting systemd-sysctl.service... Feb 9 07:03:22.133324 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 07:03:22.136112 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 07:03:22.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:22.136893 systemd[1]: Finished systemd-sysctl.service. Feb 9 07:03:22.186700 kernel: audit: type=1130 audit(1707462202.135:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:22.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:22.198829 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 07:03:22.265600 kernel: audit: type=1130 audit(1707462202.198:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:22.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:22.257083 systemd[1]: Starting dracut-cmdline.service... Feb 9 07:03:22.279597 dracut-cmdline[292]: dracut-dracut-053 Feb 9 07:03:22.279597 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 07:03:22.279597 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 07:03:22.346621 kernel: Loading iSCSI transport class v2.0-870. Feb 9 07:03:22.346634 kernel: iscsi: registered transport (tcp) Feb 9 07:03:22.398386 kernel: iscsi: registered transport (qla4xxx) Feb 9 07:03:22.398404 kernel: QLogic iSCSI HBA Driver Feb 9 07:03:22.414573 systemd[1]: Finished dracut-cmdline.service. Feb 9 07:03:22.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:22.423228 systemd[1]: Starting dracut-pre-udev.service... Feb 9 07:03:22.478552 kernel: raid6: avx2x4 gen() 49521 MB/s Feb 9 07:03:22.513528 kernel: raid6: avx2x4 xor() 22401 MB/s Feb 9 07:03:22.548526 kernel: raid6: avx2x2 gen() 54962 MB/s Feb 9 07:03:22.583525 kernel: raid6: avx2x2 xor() 32799 MB/s Feb 9 07:03:22.618555 kernel: raid6: avx2x1 gen() 46255 MB/s Feb 9 07:03:22.653558 kernel: raid6: avx2x1 xor() 28494 MB/s Feb 9 07:03:22.687552 kernel: raid6: sse2x4 gen() 21789 MB/s Feb 9 07:03:22.721562 kernel: raid6: sse2x4 xor() 11981 MB/s Feb 9 07:03:22.755563 kernel: raid6: sse2x2 gen() 22097 MB/s Feb 9 07:03:22.789558 kernel: raid6: sse2x2 xor() 13695 MB/s Feb 9 07:03:22.823558 kernel: raid6: sse2x1 gen() 18681 MB/s Feb 9 07:03:22.875514 kernel: raid6: sse2x1 xor() 9120 MB/s Feb 9 07:03:22.875529 kernel: raid6: using algorithm avx2x2 gen() 54962 MB/s Feb 9 07:03:22.875536 kernel: raid6: .... xor() 32799 MB/s, rmw enabled Feb 9 07:03:22.893761 kernel: raid6: using avx2x2 recovery algorithm Feb 9 07:03:22.940531 kernel: xor: automatically using best checksumming function avx Feb 9 07:03:23.018534 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 07:03:23.023926 systemd[1]: Finished dracut-pre-udev.service. Feb 9 07:03:23.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:23.033000 audit: BPF prog-id=7 op=LOAD Feb 9 07:03:23.033000 audit: BPF prog-id=8 op=LOAD Feb 9 07:03:23.034496 systemd[1]: Starting systemd-udevd.service... Feb 9 07:03:23.042274 systemd-udevd[473]: Using default interface naming scheme 'v252'. Feb 9 07:03:23.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:23.048981 systemd[1]: Started systemd-udevd.service. Feb 9 07:03:23.089612 dracut-pre-trigger[486]: rd.md=0: removing MD RAID activation Feb 9 07:03:23.065926 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 07:03:23.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:23.093646 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 07:03:23.108391 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 07:03:23.179253 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 07:03:23.212866 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 07:03:23.212882 kernel: libata version 3.00 loaded. Feb 9 07:03:23.212891 kernel: ACPI: bus type USB registered Feb 9 07:03:23.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:23.243775 kernel: usbcore: registered new interface driver usbfs Feb 9 07:03:23.243809 kernel: usbcore: registered new interface driver hub Feb 9 07:03:23.261654 kernel: usbcore: registered new device driver usb Feb 9 07:03:23.284507 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 07:03:23.302556 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 07:03:23.302593 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 9 07:03:23.343558 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 07:03:23.344498 kernel: AES CTR mode by8 optimization enabled Feb 9 07:03:23.363499 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 07:03:23.363518 kernel: scsi host0: ahci Feb 9 07:03:23.363537 kernel: mlx5_core 0000:01:00.0: firmware version: 14.28.2006 Feb 9 07:03:23.363609 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 07:03:23.377523 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 07:03:23.444525 kernel: pps pps0: new PPS source ptp0 Feb 9 07:03:23.444599 kernel: scsi host1: ahci Feb 9 07:03:23.444615 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 9 07:03:23.471974 kernel: scsi host2: ahci Feb 9 07:03:23.486507 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 07:03:23.515353 kernel: scsi host3: ahci Feb 9 07:03:23.515427 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d8:82 Feb 9 07:03:23.515484 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 9 07:03:23.515541 kernel: scsi host4: ahci Feb 9 07:03:23.527333 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 07:03:23.584513 kernel: pps pps1: new PPS source ptp1 Feb 9 07:03:23.584583 kernel: scsi host5: ahci Feb 9 07:03:23.584600 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 9 07:03:23.606760 kernel: scsi host6: ahci Feb 9 07:03:23.618671 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 07:03:23.618744 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Feb 9 07:03:23.623526 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 07:03:23.628795 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d8:83 Feb 9 07:03:23.638526 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 9 07:03:23.638598 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 07:03:23.643240 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Feb 9 07:03:23.658461 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 07:03:23.675604 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Feb 9 07:03:23.787525 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Feb 9 07:03:23.787540 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Feb 9 07:03:23.820983 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Feb 9 07:03:23.820997 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Feb 9 07:03:23.888546 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 07:03:23.933236 kernel: mlx5_core 0000:01:00.1: firmware version: 14.28.2006 Feb 9 07:03:23.933350 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 07:03:24.165500 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 07:03:24.165519 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 07:03:24.180526 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 07:03:24.196503 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 07:03:24.211529 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 07:03:24.226523 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 07:03:24.226628 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 07:03:24.260497 kernel: port_module: 9 callbacks suppressed Feb 9 07:03:24.260509 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Feb 9 07:03:24.260579 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 07:03:24.292499 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 07:03:24.292577 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 9 07:03:24.343556 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 9 07:03:24.394537 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 07:03:24.394579 kernel: ata1.00: Features: NCQ-prio Feb 9 07:03:24.394587 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 07:03:24.424911 kernel: ata2.00: Features: NCQ-prio Feb 9 07:03:24.443544 kernel: ata1.00: configured for UDMA/133 Feb 9 07:03:24.443588 kernel: ata2.00: configured for UDMA/133 Feb 9 07:03:24.457533 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 9 07:03:24.475528 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 9 07:03:24.509526 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 9 07:03:24.509627 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 07:03:24.561450 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 07:03:24.561590 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 07:03:24.598818 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 07:03:24.598934 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 07:03:24.598984 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 07:03:24.616752 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 07:03:24.648410 kernel: hub 1-0:1.0: USB hub found Feb 9 07:03:24.648534 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 07:03:24.648560 kernel: hub 1-0:1.0: 16 ports detected Feb 9 07:03:24.663062 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 07:03:24.663078 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 07:03:24.663177 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 07:03:24.663237 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 9 07:03:24.663315 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 9 07:03:24.663373 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 07:03:24.663437 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 07:03:24.663491 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 07:03:24.665499 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 07:03:24.665519 kernel: GPT:9289727 != 937703087 Feb 9 07:03:24.665531 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 07:03:24.665542 kernel: GPT:9289727 != 937703087 Feb 9 07:03:24.665553 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 07:03:24.665566 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 07:03:24.665578 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 07:03:24.665589 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 9 07:03:24.679498 kernel: hub 2-0:1.0: USB hub found Feb 9 07:03:24.679577 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 9 07:03:24.708665 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 07:03:24.725620 kernel: hub 2-0:1.0: 10 ports detected Feb 9 07:03:24.725693 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 07:03:24.754215 kernel: usb: port power management may be unreliable Feb 9 07:03:24.754230 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 07:03:24.754298 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 07:03:24.942583 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 07:03:24.942613 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 07:03:25.046418 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 07:03:25.046436 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 07:03:25.077544 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Feb 9 07:03:25.090614 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 07:03:25.154570 kernel: hub 1-14:1.0: USB hub found Feb 9 07:03:25.154697 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (527) Feb 9 07:03:25.154711 kernel: hub 1-14:1.0: 4 ports detected Feb 9 07:03:25.154789 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Feb 9 07:03:25.140615 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 07:03:25.168555 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 07:03:25.199386 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 07:03:25.213926 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 07:03:25.219538 systemd[1]: Starting disk-uuid.service... Feb 9 07:03:25.238815 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 07:03:25.238869 disk-uuid[693]: Primary Header is updated. Feb 9 07:03:25.238869 disk-uuid[693]: Secondary Entries is updated. Feb 9 07:03:25.238869 disk-uuid[693]: Secondary Header is updated. Feb 9 07:03:25.301576 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 07:03:25.301589 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 07:03:25.301596 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 07:03:25.301602 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 07:03:25.323535 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 07:03:25.427506 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 07:03:25.542555 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 07:03:25.573073 kernel: usbcore: registered new interface driver usbhid Feb 9 07:03:25.573088 kernel: usbhid: USB HID core driver Feb 9 07:03:25.605635 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 07:03:25.721354 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 07:03:25.721521 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 07:03:25.721530 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 07:03:26.307613 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 07:03:26.326498 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 07:03:26.327137 disk-uuid[694]: The operation has completed successfully. Feb 9 07:03:26.367072 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 07:03:26.462954 kernel: audit: type=1130 audit(1707462206.374:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:26.462969 kernel: audit: type=1131 audit(1707462206.374:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:26.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:26.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:26.367117 systemd[1]: Finished disk-uuid.service. Feb 9 07:03:26.491711 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 07:03:26.377930 systemd[1]: Starting verity-setup.service... Feb 9 07:03:26.567619 systemd[1]: Found device dev-mapper-usr.device. Feb 9 07:03:26.578637 systemd[1]: Mounting sysusr-usr.mount... Feb 9 07:03:26.590085 systemd[1]: Finished verity-setup.service. Feb 9 07:03:26.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:26.657501 kernel: audit: type=1130 audit(1707462206.604:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:26.715202 systemd[1]: Mounted sysusr-usr.mount. Feb 9 07:03:26.729627 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 07:03:26.722773 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 07:03:26.811950 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 07:03:26.811967 kernel: BTRFS info (device sdb6): using free space tree Feb 9 07:03:26.811975 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 07:03:26.811981 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 07:03:26.723176 systemd[1]: Starting ignition-setup.service... Feb 9 07:03:26.744966 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 07:03:26.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:26.819958 systemd[1]: Finished ignition-setup.service. Feb 9 07:03:26.940162 kernel: audit: type=1130 audit(1707462206.834:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:26.940176 kernel: audit: type=1130 audit(1707462206.890:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:26.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:26.834838 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 07:03:26.971592 kernel: audit: type=1334 audit(1707462206.948:24): prog-id=9 op=LOAD Feb 9 07:03:26.948000 audit: BPF prog-id=9 op=LOAD Feb 9 07:03:26.891174 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 07:03:26.949432 systemd[1]: Starting systemd-networkd.service... Feb 9 07:03:26.985863 systemd-networkd[884]: lo: Link UP Feb 9 07:03:27.052557 kernel: audit: type=1130 audit(1707462207.000:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:27.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:27.020049 ignition[873]: Ignition 2.14.0 Feb 9 07:03:26.985865 systemd-networkd[884]: lo: Gained carrier Feb 9 07:03:27.020054 ignition[873]: Stage: fetch-offline Feb 9 07:03:27.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:26.986181 systemd-networkd[884]: Enumeration completed Feb 9 07:03:27.223702 kernel: audit: type=1130 audit(1707462207.089:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:27.223717 kernel: audit: type=1130 audit(1707462207.149:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:27.223725 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 07:03:27.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:27.020080 ignition[873]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 07:03:27.248816 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Feb 9 07:03:26.986251 systemd[1]: Started systemd-networkd.service. Feb 9 07:03:27.020093 ignition[873]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 07:03:26.986959 systemd-networkd[884]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 07:03:27.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:27.028463 ignition[873]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 07:03:27.305632 iscsid[910]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 07:03:27.305632 iscsid[910]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 07:03:27.305632 iscsid[910]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 07:03:27.305632 iscsid[910]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 07:03:27.305632 iscsid[910]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 07:03:27.305632 iscsid[910]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 07:03:27.305632 iscsid[910]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 07:03:27.475678 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 9 07:03:27.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:27.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:27.001034 systemd[1]: Reached target network.target. Feb 9 07:03:27.028569 ignition[873]: parsed url from cmdline: "" Feb 9 07:03:27.049888 unknown[873]: fetched base config from "system" Feb 9 07:03:27.028571 ignition[873]: no config URL provided Feb 9 07:03:27.049894 unknown[873]: fetched user config from "system" Feb 9 07:03:27.028574 ignition[873]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 07:03:27.061246 systemd[1]: Starting iscsiuio.service... Feb 9 07:03:27.028604 ignition[873]: parsing config with SHA512: 31dc55eab48ca51e274f1e21d3c316fa2730239eb6ac31e9bdbad1d9d558d33f0c7a8a47181cec86676a49d38998518abc1e4f51c29f878925b77cb411febabc Feb 9 07:03:27.074758 systemd[1]: Started iscsiuio.service. Feb 9 07:03:27.050687 ignition[873]: fetch-offline: fetch-offline passed Feb 9 07:03:27.089863 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 07:03:27.050690 ignition[873]: POST message to Packet Timeline Feb 9 07:03:27.149748 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 07:03:27.050695 ignition[873]: POST Status error: resource requires networking Feb 9 07:03:27.150196 systemd[1]: Starting ignition-kargs.service... Feb 9 07:03:27.050731 ignition[873]: Ignition finished successfully Feb 9 07:03:27.224678 systemd-networkd[884]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 07:03:27.227642 ignition[900]: Ignition 2.14.0 Feb 9 07:03:27.238091 systemd[1]: Starting iscsid.service... Feb 9 07:03:27.227645 ignition[900]: Stage: kargs Feb 9 07:03:27.262761 systemd[1]: Started iscsid.service. Feb 9 07:03:27.227699 ignition[900]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 07:03:27.277145 systemd[1]: Starting dracut-initqueue.service... Feb 9 07:03:27.227711 ignition[900]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 07:03:27.295731 systemd[1]: Finished dracut-initqueue.service. Feb 9 07:03:27.230080 ignition[900]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 07:03:27.313624 systemd[1]: Reached target remote-fs-pre.target. Feb 9 07:03:27.230789 ignition[900]: kargs: kargs passed Feb 9 07:03:27.332652 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 07:03:27.230792 ignition[900]: POST message to Packet Timeline Feb 9 07:03:27.368728 systemd[1]: Reached target remote-fs.target. Feb 9 07:03:27.230802 ignition[900]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 07:03:27.399198 systemd[1]: Starting dracut-pre-mount.service... Feb 9 07:03:27.235668 ignition[900]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43855->[::1]:53: read: connection refused Feb 9 07:03:27.413782 systemd[1]: Finished dracut-pre-mount.service. Feb 9 07:03:27.436254 ignition[900]: GET https://metadata.packet.net/metadata: attempt #2 Feb 9 07:03:27.466635 systemd-networkd[884]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 07:03:27.436732 ignition[900]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:59617->[::1]:53: read: connection refused Feb 9 07:03:27.494853 systemd-networkd[884]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 07:03:27.525017 systemd-networkd[884]: enp1s0f1np1: Link UP Feb 9 07:03:27.525336 systemd-networkd[884]: enp1s0f1np1: Gained carrier Feb 9 07:03:27.538973 systemd-networkd[884]: enp1s0f0np0: Link UP Feb 9 07:03:27.539320 systemd-networkd[884]: eno2: Link UP Feb 9 07:03:27.539684 systemd-networkd[884]: eno1: Link UP Feb 9 07:03:27.837277 ignition[900]: GET https://metadata.packet.net/metadata: attempt #3 Feb 9 07:03:27.838266 ignition[900]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:32960->[::1]:53: read: connection refused Feb 9 07:03:28.311373 systemd-networkd[884]: enp1s0f0np0: Gained carrier Feb 9 07:03:28.319618 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Feb 9 07:03:28.349689 systemd-networkd[884]: enp1s0f0np0: DHCPv4 address 139.178.90.101/31, gateway 139.178.90.100 acquired from 145.40.83.140 Feb 9 07:03:28.638786 ignition[900]: GET https://metadata.packet.net/metadata: attempt #4 Feb 9 07:03:28.640249 ignition[900]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:58723->[::1]:53: read: connection refused Feb 9 07:03:28.992057 systemd-networkd[884]: enp1s0f1np1: Gained IPv6LL Feb 9 07:03:29.952081 systemd-networkd[884]: enp1s0f0np0: Gained IPv6LL Feb 9 07:03:30.241775 ignition[900]: GET https://metadata.packet.net/metadata: attempt #5 Feb 9 07:03:30.242955 ignition[900]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60533->[::1]:53: read: connection refused Feb 9 07:03:33.446462 ignition[900]: GET https://metadata.packet.net/metadata: attempt #6 Feb 9 07:03:33.488656 ignition[900]: GET result: OK Feb 9 07:03:33.713753 ignition[900]: Ignition finished successfully Feb 9 07:03:33.718365 systemd[1]: Finished ignition-kargs.service. Feb 9 07:03:33.806027 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 07:03:33.806044 kernel: audit: type=1130 audit(1707462213.728:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:33.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:33.738070 ignition[929]: Ignition 2.14.0 Feb 9 07:03:33.730836 systemd[1]: Starting ignition-disks.service... Feb 9 07:03:33.738074 ignition[929]: Stage: disks Feb 9 07:03:33.738126 ignition[929]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 07:03:33.738135 ignition[929]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 07:03:33.739569 ignition[929]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 07:03:33.741302 ignition[929]: disks: disks passed Feb 9 07:03:33.741306 ignition[929]: POST message to Packet Timeline Feb 9 07:03:33.741316 ignition[929]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 07:03:33.766624 ignition[929]: GET result: OK Feb 9 07:03:33.963711 ignition[929]: Ignition finished successfully Feb 9 07:03:33.966980 systemd[1]: Finished ignition-disks.service. Feb 9 07:03:33.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:33.979071 systemd[1]: Reached target initrd-root-device.target. Feb 9 07:03:34.066722 kernel: audit: type=1130 audit(1707462213.978:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:34.052679 systemd[1]: Reached target local-fs-pre.target. Feb 9 07:03:34.052716 systemd[1]: Reached target local-fs.target. Feb 9 07:03:34.074698 systemd[1]: Reached target sysinit.target. Feb 9 07:03:34.088717 systemd[1]: Reached target basic.target. Feb 9 07:03:34.103591 systemd[1]: Starting systemd-fsck-root.service... Feb 9 07:03:34.133142 systemd-fsck[944]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 07:03:34.144950 systemd[1]: Finished systemd-fsck-root.service. Feb 9 07:03:34.238584 kernel: audit: type=1130 audit(1707462214.153:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:34.238615 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 07:03:34.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:34.174036 systemd[1]: Mounting sysroot.mount... Feb 9 07:03:34.246129 systemd[1]: Mounted sysroot.mount. Feb 9 07:03:34.259768 systemd[1]: Reached target initrd-root-fs.target. Feb 9 07:03:34.267354 systemd[1]: Mounting sysroot-usr.mount... Feb 9 07:03:34.292286 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 07:03:34.300996 systemd[1]: Starting flatcar-static-network.service... Feb 9 07:03:34.317609 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 07:03:34.317645 systemd[1]: Reached target ignition-diskful.target. Feb 9 07:03:34.336660 systemd[1]: Mounted sysroot-usr.mount. Feb 9 07:03:34.360436 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 07:03:34.434591 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (957) Feb 9 07:03:34.434618 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 07:03:34.374199 systemd[1]: Starting initrd-setup-root.service... Feb 9 07:03:34.487506 kernel: BTRFS info (device sdb6): using free space tree Feb 9 07:03:34.487536 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 07:03:34.487552 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 07:03:34.487570 initrd-setup-root[962]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 07:03:34.436174 systemd[1]: Finished initrd-setup-root.service. Feb 9 07:03:34.582604 kernel: audit: type=1130 audit(1707462214.527:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:34.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:34.582641 coreos-metadata[951]: Feb 09 07:03:34.442 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 07:03:34.582641 coreos-metadata[951]: Feb 09 07:03:34.465 INFO Fetch successful Feb 9 07:03:34.582641 coreos-metadata[951]: Feb 09 07:03:34.492 INFO wrote hostname ci-3510.3.2-a-91c0951621 to /sysroot/etc/hostname Feb 9 07:03:34.788744 kernel: audit: type=1130 audit(1707462214.590:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:34.788758 kernel: audit: type=1130 audit(1707462214.654:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:34.788766 kernel: audit: type=1131 audit(1707462214.654:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:34.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:34.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:34.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:34.788827 coreos-metadata[952]: Feb 09 07:03:34.441 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 07:03:34.788827 coreos-metadata[952]: Feb 09 07:03:34.465 INFO Fetch successful Feb 9 07:03:34.807631 initrd-setup-root[970]: cut: /sysroot/etc/group: No such file or directory Feb 9 07:03:34.528829 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 07:03:34.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:34.868718 initrd-setup-root[978]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 07:03:34.906609 kernel: audit: type=1130 audit(1707462214.840:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:34.590788 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 9 07:03:34.916745 initrd-setup-root[986]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 07:03:34.590826 systemd[1]: Finished flatcar-static-network.service. Feb 9 07:03:34.654762 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 07:03:34.942642 ignition[1027]: INFO : Ignition 2.14.0 Feb 9 07:03:34.942642 ignition[1027]: INFO : Stage: mount Feb 9 07:03:34.942642 ignition[1027]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 07:03:34.942642 ignition[1027]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 07:03:34.942642 ignition[1027]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 07:03:34.942642 ignition[1027]: INFO : mount: mount passed Feb 9 07:03:34.942642 ignition[1027]: INFO : POST message to Packet Timeline Feb 9 07:03:34.942642 ignition[1027]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 07:03:34.942642 ignition[1027]: INFO : GET result: OK Feb 9 07:03:34.776081 systemd[1]: Starting ignition-mount.service... Feb 9 07:03:34.796059 systemd[1]: Starting sysroot-boot.service... Feb 9 07:03:34.822438 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 07:03:34.822479 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 07:03:34.823113 systemd[1]: Finished sysroot-boot.service. Feb 9 07:03:35.100778 ignition[1027]: INFO : Ignition finished successfully Feb 9 07:03:35.103545 systemd[1]: Finished ignition-mount.service. Feb 9 07:03:35.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:35.120788 systemd[1]: Starting ignition-files.service... Feb 9 07:03:35.198579 kernel: audit: type=1130 audit(1707462215.118:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:35.193337 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 07:03:35.246590 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1041) Feb 9 07:03:35.246601 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 07:03:35.280615 kernel: BTRFS info (device sdb6): using free space tree Feb 9 07:03:35.280629 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 07:03:35.329501 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 07:03:35.330720 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 07:03:35.348642 ignition[1060]: INFO : Ignition 2.14.0 Feb 9 07:03:35.348642 ignition[1060]: INFO : Stage: files Feb 9 07:03:35.348642 ignition[1060]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 07:03:35.348642 ignition[1060]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 07:03:35.348642 ignition[1060]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 07:03:35.348642 ignition[1060]: DEBUG : files: compiled without relabeling support, skipping Feb 9 07:03:35.348642 ignition[1060]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 07:03:35.348642 ignition[1060]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 07:03:35.351359 unknown[1060]: wrote ssh authorized keys file for user: core Feb 9 07:03:35.451759 ignition[1060]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 07:03:35.451759 ignition[1060]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 07:03:35.451759 ignition[1060]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 07:03:35.451759 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 07:03:35.451759 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 07:03:35.648516 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 07:03:35.707973 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 07:03:35.707973 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 07:03:35.742705 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 07:03:36.197870 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 07:03:36.292301 ignition[1060]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 07:03:36.292301 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 07:03:36.334708 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 07:03:36.334708 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 07:03:36.668809 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 07:03:36.719200 ignition[1060]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 07:03:36.719200 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 07:03:36.761593 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 07:03:36.761593 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 9 07:03:36.829807 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 07:03:37.017203 ignition[1060]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 9 07:03:37.017203 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 07:03:37.057683 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 07:03:37.057683 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 9 07:03:37.089634 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 07:03:37.456417 ignition[1060]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 9 07:03:37.456417 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 07:03:37.497703 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 07:03:37.497703 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Feb 9 07:03:37.529566 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 07:03:37.682096 ignition[1060]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 07:03:37.717599 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3225995225" Feb 9 07:03:37.977774 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1069) Feb 9 07:03:37.967097 systemd[1]: Finished ignition-files.service. Feb 9 07:03:37.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.044295 ignition[1060]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3225995225": device or resource busy Feb 9 07:03:38.044295 ignition[1060]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3225995225", trying btrfs: device or resource busy Feb 9 07:03:38.044295 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3225995225" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3225995225" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem3225995225" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem3225995225" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: op(14): [started] processing unit "packet-phone-home.service" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: op(14): [finished] processing unit "packet-phone-home.service" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Feb 9 07:03:38.044295 ignition[1060]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 07:03:38.422787 kernel: audit: type=1130 audit(1707462217.985:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:37.991769 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 07:03:38.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-critools.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(1d): [started] setting preset to enabled for "prepare-helm.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(1d): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(1e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(1e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(1f): [started] setting preset to enabled for "packet-phone-home.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: op(1f): [finished] setting preset to enabled for "packet-phone-home.service" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: createResultFile: createFiles: op(20): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: createResultFile: createFiles: op(20): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 07:03:38.442024 ignition[1060]: INFO : files: files passed Feb 9 07:03:38.442024 ignition[1060]: INFO : POST message to Packet Timeline Feb 9 07:03:38.442024 ignition[1060]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 07:03:38.442024 ignition[1060]: INFO : GET result: OK Feb 9 07:03:38.442024 ignition[1060]: INFO : Ignition finished successfully Feb 9 07:03:39.196718 kernel: kauditd_printk_skb: 8 callbacks suppressed Feb 9 07:03:39.196737 kernel: audit: type=1131 audit(1707462218.739:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.196746 kernel: audit: type=1131 audit(1707462218.828:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.196757 kernel: audit: type=1131 audit(1707462218.978:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.196764 kernel: audit: type=1131 audit(1707462219.054:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.196771 kernel: audit: type=1131 audit(1707462219.120:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.052731 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 07:03:39.220819 iscsid[910]: iscsid shutting down. Feb 9 07:03:39.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.053044 systemd[1]: Starting ignition-quench.service... Feb 9 07:03:39.304719 kernel: audit: type=1131 audit(1707462219.229:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.304737 initrd-setup-root-after-ignition[1090]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 07:03:39.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.098891 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 07:03:39.442779 kernel: audit: type=1131 audit(1707462219.312:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.442792 kernel: audit: type=1131 audit(1707462219.382:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.126062 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 07:03:39.507487 kernel: audit: type=1131 audit(1707462219.449:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.126185 systemd[1]: Finished ignition-quench.service. Feb 9 07:03:39.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.151059 systemd[1]: Reached target ignition-complete.target. Feb 9 07:03:39.591708 kernel: audit: type=1131 audit(1707462219.516:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.175585 systemd[1]: Starting initrd-parse-etc.service... Feb 9 07:03:38.203011 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 07:03:39.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.203067 systemd[1]: Finished initrd-parse-etc.service. Feb 9 07:03:39.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.638755 ignition[1105]: INFO : Ignition 2.14.0 Feb 9 07:03:39.638755 ignition[1105]: INFO : Stage: umount Feb 9 07:03:39.638755 ignition[1105]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 07:03:39.638755 ignition[1105]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 07:03:39.638755 ignition[1105]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 07:03:39.638755 ignition[1105]: INFO : umount: umount passed Feb 9 07:03:39.638755 ignition[1105]: INFO : POST message to Packet Timeline Feb 9 07:03:39.638755 ignition[1105]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 07:03:39.638755 ignition[1105]: INFO : GET result: OK Feb 9 07:03:39.638755 ignition[1105]: INFO : Ignition finished successfully Feb 9 07:03:39.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:39.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.213820 systemd[1]: Reached target initrd-fs.target. Feb 9 07:03:39.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.239750 systemd[1]: Reached target initrd.target. Feb 9 07:03:39.819000 audit: BPF prog-id=6 op=UNLOAD Feb 9 07:03:38.259938 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 07:03:38.262112 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 07:03:39.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.293587 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 07:03:39.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.314774 systemd[1]: Starting initrd-cleanup.service... Feb 9 07:03:39.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.352926 systemd[1]: Stopped target nss-lookup.target. Feb 9 07:03:38.364049 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 07:03:39.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.387270 systemd[1]: Stopped target timers.target. Feb 9 07:03:38.406203 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 07:03:38.406592 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 07:03:39.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.432382 systemd[1]: Stopped target initrd.target. Feb 9 07:03:39.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.449089 systemd[1]: Stopped target basic.target. Feb 9 07:03:39.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.473088 systemd[1]: Stopped target ignition-complete.target. Feb 9 07:03:38.494202 systemd[1]: Stopped target ignition-diskful.target. Feb 9 07:03:40.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.514092 systemd[1]: Stopped target initrd-root-device.target. Feb 9 07:03:40.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:40.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.540097 systemd[1]: Stopped target remote-fs.target. Feb 9 07:03:38.566085 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 07:03:38.587120 systemd[1]: Stopped target sysinit.target. Feb 9 07:03:38.609111 systemd[1]: Stopped target local-fs.target. Feb 9 07:03:38.632086 systemd[1]: Stopped target local-fs-pre.target. Feb 9 07:03:38.653210 systemd[1]: Stopped target swap.target. Feb 9 07:03:38.672946 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 07:03:38.673314 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 07:03:38.695309 systemd[1]: Stopped target cryptsetup.target. Feb 9 07:03:38.716978 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 07:03:38.717347 systemd[1]: Stopped dracut-initqueue.service. Feb 9 07:03:38.740225 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 07:03:38.740599 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 07:03:38.828812 systemd[1]: Stopped target paths.target. Feb 9 07:03:38.893728 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 07:03:38.898723 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 07:03:38.906905 systemd[1]: Stopped target slices.target. Feb 9 07:03:38.929847 systemd[1]: Stopped target sockets.target. Feb 9 07:03:38.960856 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 07:03:40.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:38.961014 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 07:03:38.979015 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 07:03:38.979243 systemd[1]: Stopped ignition-files.service. Feb 9 07:03:39.054822 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 07:03:39.054904 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 07:03:39.121275 systemd[1]: Stopping ignition-mount.service... Feb 9 07:03:39.187850 systemd[1]: Stopping iscsid.service... Feb 9 07:03:39.203705 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 07:03:39.203779 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 07:03:39.230304 systemd[1]: Stopping sysroot-boot.service... Feb 9 07:03:39.297713 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 07:03:39.297798 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 07:03:39.313065 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 07:03:39.313362 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 07:03:39.384125 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 07:03:39.384441 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 07:03:39.384483 systemd[1]: Stopped iscsid.service. Feb 9 07:03:39.449940 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 07:03:39.449979 systemd[1]: Stopped ignition-mount.service. Feb 9 07:03:39.516895 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 07:03:39.516933 systemd[1]: Stopped sysroot-boot.service. Feb 9 07:03:39.582931 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 07:03:39.582976 systemd[1]: Closed iscsid.socket. Feb 9 07:03:39.598722 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 07:03:39.598743 systemd[1]: Stopped ignition-disks.service. Feb 9 07:03:39.614739 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 07:03:39.614775 systemd[1]: Stopped ignition-kargs.service. Feb 9 07:03:39.631751 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 07:03:39.631793 systemd[1]: Stopped ignition-setup.service. Feb 9 07:03:39.646744 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 07:03:39.646799 systemd[1]: Stopped initrd-setup-root.service. Feb 9 07:03:39.653824 systemd[1]: Stopping iscsiuio.service... Feb 9 07:03:39.673309 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 07:03:39.673489 systemd[1]: Stopped iscsiuio.service. Feb 9 07:03:39.691341 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 07:03:39.691559 systemd[1]: Finished initrd-cleanup.service. Feb 9 07:03:39.722106 systemd[1]: Stopped target network.target. Feb 9 07:03:39.738820 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 07:03:39.738941 systemd[1]: Closed iscsiuio.socket. Feb 9 07:03:39.754124 systemd[1]: Stopping systemd-networkd.service... Feb 9 07:03:39.760657 systemd-networkd[884]: enp1s0f0np0: DHCPv6 lease lost Feb 9 07:03:39.768938 systemd[1]: Stopping systemd-resolved.service... Feb 9 07:03:39.772682 systemd-networkd[884]: enp1s0f1np1: DHCPv6 lease lost Feb 9 07:03:39.779552 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 07:03:39.779775 systemd[1]: Stopped systemd-resolved.service. Feb 9 07:03:40.314000 audit: BPF prog-id=9 op=UNLOAD Feb 9 07:03:39.791551 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 07:03:39.791763 systemd[1]: Stopped systemd-networkd.service. Feb 9 07:03:39.813195 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 07:03:39.813278 systemd[1]: Closed systemd-networkd.socket. Feb 9 07:03:39.829131 systemd[1]: Stopping network-cleanup.service... Feb 9 07:03:40.315516 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Feb 9 07:03:39.841702 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 07:03:39.841844 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 07:03:39.860900 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 07:03:39.861034 systemd[1]: Stopped systemd-sysctl.service. Feb 9 07:03:39.878222 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 07:03:39.878350 systemd[1]: Stopped systemd-modules-load.service. Feb 9 07:03:39.893218 systemd[1]: Stopping systemd-udevd.service... Feb 9 07:03:39.910086 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 07:03:39.911385 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 07:03:39.911692 systemd[1]: Stopped systemd-udevd.service. Feb 9 07:03:39.924181 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 07:03:39.924301 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 07:03:39.937893 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 07:03:39.937983 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 07:03:39.952781 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 07:03:39.952939 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 07:03:39.968881 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 07:03:39.968995 systemd[1]: Stopped dracut-cmdline.service. Feb 9 07:03:39.983788 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 07:03:39.983897 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 07:03:40.000310 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 07:03:40.013588 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 07:03:40.013660 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 07:03:40.029852 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 07:03:40.029903 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 07:03:40.184811 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 07:03:40.185026 systemd[1]: Stopped network-cleanup.service. Feb 9 07:03:40.200188 systemd[1]: Reached target initrd-switch-root.target. Feb 9 07:03:40.219178 systemd[1]: Starting initrd-switch-root.service... Feb 9 07:03:40.254875 systemd[1]: Switching root. Feb 9 07:03:40.316084 systemd-journald[267]: Journal stopped Feb 9 07:03:44.270628 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 07:03:44.270642 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 07:03:44.270652 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 07:03:44.270658 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 07:03:44.270663 kernel: SELinux: policy capability open_perms=1 Feb 9 07:03:44.270668 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 07:03:44.270674 kernel: SELinux: policy capability always_check_network=0 Feb 9 07:03:44.270680 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 07:03:44.270685 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 07:03:44.270707 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 07:03:44.270712 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 07:03:44.270718 systemd[1]: Successfully loaded SELinux policy in 314.754ms. Feb 9 07:03:44.270725 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.138ms. Feb 9 07:03:44.270732 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 07:03:44.270739 systemd[1]: Detected architecture x86-64. Feb 9 07:03:44.270745 systemd[1]: Detected first boot. Feb 9 07:03:44.270751 systemd[1]: Hostname set to . Feb 9 07:03:44.270757 systemd[1]: Initializing machine ID from random generator. Feb 9 07:03:44.270763 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 07:03:44.270769 systemd[1]: Populated /etc with preset unit settings. Feb 9 07:03:44.270775 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 07:03:44.270782 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 07:03:44.270789 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 07:03:44.270795 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 07:03:44.270801 systemd[1]: Stopped initrd-switch-root.service. Feb 9 07:03:44.270807 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 07:03:44.270813 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 07:03:44.270820 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 07:03:44.270827 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 07:03:44.270833 systemd[1]: Created slice system-getty.slice. Feb 9 07:03:44.270839 systemd[1]: Created slice system-modprobe.slice. Feb 9 07:03:44.270845 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 07:03:44.270851 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 07:03:44.270857 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 07:03:44.270863 systemd[1]: Created slice user.slice. Feb 9 07:03:44.270869 systemd[1]: Started systemd-ask-password-console.path. Feb 9 07:03:44.270877 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 07:03:44.270884 systemd[1]: Set up automount boot.automount. Feb 9 07:03:44.270891 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 07:03:44.270898 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 07:03:44.270907 systemd[1]: Stopped target initrd-fs.target. Feb 9 07:03:44.270913 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 07:03:44.270920 systemd[1]: Reached target integritysetup.target. Feb 9 07:03:44.270926 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 07:03:44.270933 systemd[1]: Reached target remote-fs.target. Feb 9 07:03:44.270939 systemd[1]: Reached target slices.target. Feb 9 07:03:44.270946 systemd[1]: Reached target swap.target. Feb 9 07:03:44.270952 systemd[1]: Reached target torcx.target. Feb 9 07:03:44.270958 systemd[1]: Reached target veritysetup.target. Feb 9 07:03:44.270964 systemd[1]: Listening on systemd-coredump.socket. Feb 9 07:03:44.270971 systemd[1]: Listening on systemd-initctl.socket. Feb 9 07:03:44.270977 systemd[1]: Listening on systemd-networkd.socket. Feb 9 07:03:44.270984 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 07:03:44.270991 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 07:03:44.270997 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 07:03:44.271004 systemd[1]: Mounting dev-hugepages.mount... Feb 9 07:03:44.271010 systemd[1]: Mounting dev-mqueue.mount... Feb 9 07:03:44.271017 systemd[1]: Mounting media.mount... Feb 9 07:03:44.271024 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 07:03:44.271031 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 07:03:44.271037 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 07:03:44.271044 systemd[1]: Mounting tmp.mount... Feb 9 07:03:44.271050 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 07:03:44.271056 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 07:03:44.271063 systemd[1]: Starting kmod-static-nodes.service... Feb 9 07:03:44.271069 systemd[1]: Starting modprobe@configfs.service... Feb 9 07:03:44.271075 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 07:03:44.271082 systemd[1]: Starting modprobe@drm.service... Feb 9 07:03:44.271089 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 07:03:44.271095 systemd[1]: Starting modprobe@fuse.service... Feb 9 07:03:44.271102 kernel: fuse: init (API version 7.34) Feb 9 07:03:44.271108 systemd[1]: Starting modprobe@loop.service... Feb 9 07:03:44.271114 kernel: loop: module loaded Feb 9 07:03:44.271120 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 07:03:44.271127 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 07:03:44.271134 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 07:03:44.271141 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 07:03:44.271147 kernel: kauditd_printk_skb: 50 callbacks suppressed Feb 9 07:03:44.271153 kernel: audit: type=1131 audit(1707462223.913:102): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.271159 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 07:03:44.271165 kernel: audit: type=1131 audit(1707462224.000:103): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.271171 systemd[1]: Stopped systemd-journald.service. Feb 9 07:03:44.271178 kernel: audit: type=1130 audit(1707462224.064:104): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.271185 kernel: audit: type=1131 audit(1707462224.064:105): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.271191 kernel: audit: type=1334 audit(1707462224.149:106): prog-id=15 op=LOAD Feb 9 07:03:44.271196 kernel: audit: type=1334 audit(1707462224.167:107): prog-id=16 op=LOAD Feb 9 07:03:44.271202 kernel: audit: type=1334 audit(1707462224.186:108): prog-id=17 op=LOAD Feb 9 07:03:44.271208 kernel: audit: type=1334 audit(1707462224.204:109): prog-id=13 op=UNLOAD Feb 9 07:03:44.271213 systemd[1]: Starting systemd-journald.service... Feb 9 07:03:44.271220 kernel: audit: type=1334 audit(1707462224.204:110): prog-id=14 op=UNLOAD Feb 9 07:03:44.271225 systemd[1]: Starting systemd-modules-load.service... Feb 9 07:03:44.271233 kernel: audit: type=1305 audit(1707462224.268:111): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 07:03:44.271241 systemd-journald[1256]: Journal started Feb 9 07:03:44.271266 systemd-journald[1256]: Runtime Journal (/run/log/journal/7348d0007bb54158a098487e98a0615e) is 8.0M, max 640.1M, 632.1M free. Feb 9 07:03:40.773000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 07:03:41.044000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 07:03:41.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 07:03:41.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 07:03:41.046000 audit: BPF prog-id=10 op=LOAD Feb 9 07:03:41.046000 audit: BPF prog-id=10 op=UNLOAD Feb 9 07:03:41.046000 audit: BPF prog-id=11 op=LOAD Feb 9 07:03:41.046000 audit: BPF prog-id=11 op=UNLOAD Feb 9 07:03:41.111000 audit[1147]: AVC avc: denied { associate } for pid=1147 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 07:03:41.111000 audit[1147]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001278e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1130 pid=1147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:03:41.111000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 07:03:41.138000 audit[1147]: AVC avc: denied { associate } for pid=1147 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 07:03:41.138000 audit[1147]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001279b9 a2=1ed a3=0 items=2 ppid=1130 pid=1147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:03:41.138000 audit: CWD cwd="/" Feb 9 07:03:41.138000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:41.138000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:41.138000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 07:03:42.654000 audit: BPF prog-id=12 op=LOAD Feb 9 07:03:42.654000 audit: BPF prog-id=3 op=UNLOAD Feb 9 07:03:42.654000 audit: BPF prog-id=13 op=LOAD Feb 9 07:03:42.654000 audit: BPF prog-id=14 op=LOAD Feb 9 07:03:42.654000 audit: BPF prog-id=4 op=UNLOAD Feb 9 07:03:42.654000 audit: BPF prog-id=5 op=UNLOAD Feb 9 07:03:42.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:42.704000 audit: BPF prog-id=12 op=UNLOAD Feb 9 07:03:42.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:42.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:43.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.149000 audit: BPF prog-id=15 op=LOAD Feb 9 07:03:44.167000 audit: BPF prog-id=16 op=LOAD Feb 9 07:03:44.186000 audit: BPF prog-id=17 op=LOAD Feb 9 07:03:44.204000 audit: BPF prog-id=13 op=UNLOAD Feb 9 07:03:44.204000 audit: BPF prog-id=14 op=UNLOAD Feb 9 07:03:44.268000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 07:03:41.110491 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 07:03:42.653144 systemd[1]: Queued start job for default target multi-user.target. Feb 9 07:03:41.110891 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 07:03:42.655737 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 07:03:41.110906 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 07:03:41.110928 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 07:03:41.110935 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 07:03:41.110956 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 07:03:41.110966 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 07:03:41.111110 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 07:03:41.111137 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 07:03:41.111151 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 07:03:41.111592 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 07:03:41.111615 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 07:03:41.111629 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 07:03:41.111639 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 07:03:41.111651 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 07:03:41.111660 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 07:03:42.301514 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:42Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 07:03:42.301658 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:42Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 07:03:42.301712 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:42Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 07:03:42.301799 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:42Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 07:03:42.301830 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:42Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 07:03:42.301865 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T07:03:42Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 07:03:44.268000 audit[1256]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffdd2db4c90 a2=4000 a3=7ffdd2db4d2c items=0 ppid=1 pid=1256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:03:44.268000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 07:03:44.349567 systemd[1]: Starting systemd-network-generator.service... Feb 9 07:03:44.376531 systemd[1]: Starting systemd-remount-fs.service... Feb 9 07:03:44.403556 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 07:03:44.446262 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 07:03:44.446286 systemd[1]: Stopped verity-setup.service. Feb 9 07:03:44.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.491545 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 07:03:44.511673 systemd[1]: Started systemd-journald.service. Feb 9 07:03:44.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.519015 systemd[1]: Mounted dev-hugepages.mount. Feb 9 07:03:44.525758 systemd[1]: Mounted dev-mqueue.mount. Feb 9 07:03:44.532741 systemd[1]: Mounted media.mount. Feb 9 07:03:44.539742 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 07:03:44.548740 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 07:03:44.557720 systemd[1]: Mounted tmp.mount. Feb 9 07:03:44.564800 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 07:03:44.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.572805 systemd[1]: Finished kmod-static-nodes.service. Feb 9 07:03:44.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.580746 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 07:03:44.580838 systemd[1]: Finished modprobe@configfs.service. Feb 9 07:03:44.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.589866 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 07:03:44.589981 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 07:03:44.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.598974 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 07:03:44.599128 systemd[1]: Finished modprobe@drm.service. Feb 9 07:03:44.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.608118 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 07:03:44.608353 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 07:03:44.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.617339 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 07:03:44.617655 systemd[1]: Finished modprobe@fuse.service. Feb 9 07:03:44.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.626337 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 07:03:44.626718 systemd[1]: Finished modprobe@loop.service. Feb 9 07:03:44.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.635369 systemd[1]: Finished systemd-modules-load.service. Feb 9 07:03:44.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.644298 systemd[1]: Finished systemd-network-generator.service. Feb 9 07:03:44.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.653276 systemd[1]: Finished systemd-remount-fs.service. Feb 9 07:03:44.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.662265 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 07:03:44.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.671740 systemd[1]: Reached target network-pre.target. Feb 9 07:03:44.682236 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 07:03:44.691231 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 07:03:44.698696 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 07:03:44.699677 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 07:03:44.707166 systemd[1]: Starting systemd-journal-flush.service... Feb 9 07:03:44.711032 systemd-journald[1256]: Time spent on flushing to /var/log/journal/7348d0007bb54158a098487e98a0615e is 15.062ms for 1612 entries. Feb 9 07:03:44.711032 systemd-journald[1256]: System Journal (/var/log/journal/7348d0007bb54158a098487e98a0615e) is 8.0M, max 195.6M, 187.6M free. Feb 9 07:03:44.750252 systemd-journald[1256]: Received client request to flush runtime journal. Feb 9 07:03:44.724599 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 07:03:44.725249 systemd[1]: Starting systemd-random-seed.service... Feb 9 07:03:44.739594 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 07:03:44.740261 systemd[1]: Starting systemd-sysctl.service... Feb 9 07:03:44.747260 systemd[1]: Starting systemd-sysusers.service... Feb 9 07:03:44.754068 systemd[1]: Starting systemd-udev-settle.service... Feb 9 07:03:44.762668 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 07:03:44.770651 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 07:03:44.778725 systemd[1]: Finished systemd-journal-flush.service. Feb 9 07:03:44.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.786702 systemd[1]: Finished systemd-random-seed.service. Feb 9 07:03:44.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.794690 systemd[1]: Finished systemd-sysctl.service. Feb 9 07:03:44.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.802690 systemd[1]: Finished systemd-sysusers.service. Feb 9 07:03:44.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:44.811686 systemd[1]: Reached target first-boot-complete.target. Feb 9 07:03:44.819766 udevadm[1272]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 07:03:45.000705 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 07:03:45.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:45.009000 audit: BPF prog-id=18 op=LOAD Feb 9 07:03:45.009000 audit: BPF prog-id=19 op=LOAD Feb 9 07:03:45.009000 audit: BPF prog-id=7 op=UNLOAD Feb 9 07:03:45.009000 audit: BPF prog-id=8 op=UNLOAD Feb 9 07:03:45.010800 systemd[1]: Starting systemd-udevd.service... Feb 9 07:03:45.022007 systemd-udevd[1273]: Using default interface naming scheme 'v252'. Feb 9 07:03:45.041246 systemd[1]: Started systemd-udevd.service. Feb 9 07:03:45.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:45.051602 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 07:03:45.051000 audit: BPF prog-id=20 op=LOAD Feb 9 07:03:45.052871 systemd[1]: Starting systemd-networkd.service... Feb 9 07:03:45.077507 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 07:03:45.077587 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 07:03:45.095555 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 07:03:45.095615 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 07:03:45.095640 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1282) Feb 9 07:03:45.134000 audit: BPF prog-id=21 op=LOAD Feb 9 07:03:45.159000 audit: BPF prog-id=22 op=LOAD Feb 9 07:03:45.159000 audit: BPF prog-id=23 op=LOAD Feb 9 07:03:45.160829 systemd[1]: Starting systemd-userdbd.service... Feb 9 07:03:45.179505 kernel: IPMI message handler: version 39.2 Feb 9 07:03:45.179554 kernel: ACPI: button: Power Button [PWRF] Feb 9 07:03:45.194920 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 07:03:45.092000 audit[1341]: AVC avc: denied { confidentiality } for pid=1341 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 07:03:45.092000 audit[1341]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55773d62e3d0 a1=4d8bc a2=7fcf8b678bc5 a3=5 items=42 ppid=1273 pid=1341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:03:45.092000 audit: CWD cwd="/" Feb 9 07:03:45.092000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=1 name=(null) inode=16053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=2 name=(null) inode=16053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=3 name=(null) inode=16054 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=4 name=(null) inode=16053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=5 name=(null) inode=16055 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=6 name=(null) inode=16053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=7 name=(null) inode=16056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=8 name=(null) inode=16056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=9 name=(null) inode=16057 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=10 name=(null) inode=16056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=11 name=(null) inode=16058 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=12 name=(null) inode=16056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=13 name=(null) inode=16059 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=14 name=(null) inode=16056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=15 name=(null) inode=16060 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=16 name=(null) inode=16056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=17 name=(null) inode=16061 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=18 name=(null) inode=16053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=19 name=(null) inode=16062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=20 name=(null) inode=16062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=21 name=(null) inode=16063 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=22 name=(null) inode=16062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=23 name=(null) inode=16064 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=24 name=(null) inode=16062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=25 name=(null) inode=16065 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=26 name=(null) inode=16062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=27 name=(null) inode=16066 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=28 name=(null) inode=16062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=29 name=(null) inode=16067 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=30 name=(null) inode=16053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=31 name=(null) inode=16068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=32 name=(null) inode=16068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=33 name=(null) inode=16069 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=34 name=(null) inode=16068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=35 name=(null) inode=16070 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=36 name=(null) inode=16068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=37 name=(null) inode=16071 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=38 name=(null) inode=16068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=39 name=(null) inode=16072 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=40 name=(null) inode=16068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PATH item=41 name=(null) inode=16073 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:03:45.092000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 07:03:45.217512 kernel: ipmi device interface Feb 9 07:03:45.249602 systemd[1]: Started systemd-userdbd.service. Feb 9 07:03:45.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:45.290559 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 07:03:45.290682 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 07:03:45.291754 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 07:03:45.291855 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 07:03:45.291939 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 07:03:45.394659 kernel: ipmi_si: IPMI System Interface driver Feb 9 07:03:45.394701 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 07:03:45.394772 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 07:03:45.415221 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 07:03:45.434503 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 07:03:45.434615 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 07:03:45.492775 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 07:03:45.545752 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 9 07:03:45.545886 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 9 07:03:45.545956 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 07:03:45.585201 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 07:03:45.585228 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 07:03:45.647114 kernel: intel_rapl_common: Found RAPL domain package Feb 9 07:03:45.647163 kernel: intel_rapl_common: Found RAPL domain core Feb 9 07:03:45.647177 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 07:03:45.647345 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 07:03:45.651848 systemd-networkd[1321]: bond0: netdev ready Feb 9 07:03:45.653974 systemd-networkd[1321]: lo: Link UP Feb 9 07:03:45.653977 systemd-networkd[1321]: lo: Gained carrier Feb 9 07:03:45.654441 systemd-networkd[1321]: Enumeration completed Feb 9 07:03:45.654500 systemd[1]: Started systemd-networkd.service. Feb 9 07:03:45.654723 systemd-networkd[1321]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 07:03:45.697965 systemd-networkd[1321]: enp1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:97:f6:b1.network. Feb 9 07:03:45.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:45.744532 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 9 07:03:45.852499 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 07:03:45.872527 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 07:03:45.874741 systemd[1]: Finished systemd-udev-settle.service. Feb 9 07:03:45.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:45.884273 systemd[1]: Starting lvm2-activation-early.service... Feb 9 07:03:45.901082 lvm[1379]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 07:03:45.928932 systemd[1]: Finished lvm2-activation-early.service. Feb 9 07:03:45.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:45.938680 systemd[1]: Reached target cryptsetup.target. Feb 9 07:03:45.948289 systemd[1]: Starting lvm2-activation.service... Feb 9 07:03:45.950398 lvm[1380]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 07:03:45.977899 systemd[1]: Finished lvm2-activation.service. Feb 9 07:03:45.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:45.986622 systemd[1]: Reached target local-fs-pre.target. Feb 9 07:03:45.994568 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 07:03:45.994583 systemd[1]: Reached target local-fs.target. Feb 9 07:03:46.002573 systemd[1]: Reached target machines.target. Feb 9 07:03:46.011188 systemd[1]: Starting ldconfig.service... Feb 9 07:03:46.018119 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 07:03:46.018142 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 07:03:46.018666 systemd[1]: Starting systemd-boot-update.service... Feb 9 07:03:46.025995 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 07:03:46.037066 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 07:03:46.037177 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 07:03:46.037210 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 07:03:46.037732 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 07:03:46.037946 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1382 (bootctl) Feb 9 07:03:46.038526 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 07:03:46.058889 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 07:03:46.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:46.192563 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 07:03:46.200353 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 9 07:03:46.221405 systemd-tmpfiles[1386]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 07:03:46.230183 systemd-networkd[1321]: enp1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:97:f6:b0.network. Feb 9 07:03:46.301658 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 07:03:46.400605 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 9 07:03:46.425550 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 9 07:03:46.425606 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 07:03:46.425619 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 07:03:46.465166 systemd-networkd[1321]: bond0: Link UP Feb 9 07:03:46.465351 systemd-networkd[1321]: enp1s0f1np1: Link UP Feb 9 07:03:46.465484 systemd-networkd[1321]: enp1s0f1np1: Gained carrier Feb 9 07:03:46.466437 systemd-networkd[1321]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:97:f6:b0.network. Feb 9 07:03:46.506502 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.526498 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.545460 systemd-tmpfiles[1386]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 07:03:46.546500 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.561209 systemd-tmpfiles[1386]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 07:03:46.567512 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.587430 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 07:03:46.587500 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.587775 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 07:03:46.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:46.607499 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.607610 systemd-fsck[1390]: fsck.fat 4.2 (2021-01-31) Feb 9 07:03:46.607610 systemd-fsck[1390]: /dev/sdb1: 789 files, 115332/258078 clusters Feb 9 07:03:46.608380 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 07:03:46.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:46.627336 systemd[1]: Mounting boot.mount... Feb 9 07:03:46.627497 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.641472 systemd[1]: Mounted boot.mount. Feb 9 07:03:46.646507 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.665538 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.674605 systemd[1]: Finished systemd-boot-update.service. Feb 9 07:03:46.684499 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:46.702891 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 07:03:46.703547 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:46.719370 systemd[1]: Starting audit-rules.service... Feb 9 07:03:46.722509 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.737158 systemd[1]: Starting clean-ca-certificates.service... Feb 9 07:03:46.738000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 07:03:46.738000 audit[1410]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffeb0cc3e0 a2=420 a3=0 items=0 ppid=1394 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:03:46.738000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 07:03:46.739455 augenrules[1410]: No rules Feb 9 07:03:46.741499 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.757126 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 07:03:46.759499 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.778042 systemd[1]: Starting systemd-resolved.service... Feb 9 07:03:46.778497 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.796497 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.796571 systemd[1]: Starting systemd-timesyncd.service... Feb 9 07:03:46.801685 ldconfig[1381]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 07:03:46.811058 systemd[1]: Starting systemd-update-utmp.service... Feb 9 07:03:46.815498 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.815514 systemd-networkd[1321]: enp1s0f0np0: Link UP Feb 9 07:03:46.815686 systemd-networkd[1321]: bond0: Gained carrier Feb 9 07:03:46.815772 systemd-networkd[1321]: enp1s0f0np0: Gained carrier Feb 9 07:03:46.828845 systemd[1]: Finished ldconfig.service. Feb 9 07:03:46.832500 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 07:03:46.832519 kernel: bond0: (slave enp1s0f1np1): link status definitely down, disabling slave Feb 9 07:03:46.832533 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 07:03:46.864721 systemd[1]: Finished audit-rules.service. Feb 9 07:03:46.882111 systemd-networkd[1321]: enp1s0f1np1: Link DOWN Feb 9 07:03:46.882114 systemd-networkd[1321]: enp1s0f1np1: Lost carrier Feb 9 07:03:46.882496 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 07:03:46.882516 kernel: bond0: active interface up! Feb 9 07:03:46.900688 systemd[1]: Finished clean-ca-certificates.service. Feb 9 07:03:46.908699 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 07:03:46.920253 systemd[1]: Finished systemd-update-utmp.service. Feb 9 07:03:46.929215 systemd[1]: Starting systemd-update-done.service... Feb 9 07:03:46.935597 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 07:03:46.935765 systemd[1]: Finished systemd-update-done.service. Feb 9 07:03:46.946244 systemd[1]: Started systemd-timesyncd.service. Feb 9 07:03:46.947751 systemd-resolved[1416]: Positive Trust Anchors: Feb 9 07:03:46.947756 systemd-resolved[1416]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 07:03:46.947775 systemd-resolved[1416]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 07:03:46.951711 systemd-resolved[1416]: Using system hostname 'ci-3510.3.2-a-91c0951621'. Feb 9 07:03:46.954666 systemd[1]: Reached target time-set.target. Feb 9 07:03:47.032499 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 07:03:47.036019 systemd-networkd[1321]: enp1s0f1np1: Link UP Feb 9 07:03:47.036181 systemd-networkd[1321]: enp1s0f1np1: Gained carrier Feb 9 07:03:47.037022 systemd[1]: Started systemd-resolved.service. Feb 9 07:03:47.045595 systemd[1]: Reached target network.target. Feb 9 07:03:47.053574 systemd[1]: Reached target nss-lookup.target. Feb 9 07:03:47.061572 systemd[1]: Reached target sysinit.target. Feb 9 07:03:47.069615 systemd[1]: Started motdgen.path. Feb 9 07:03:47.076586 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 07:03:47.086643 systemd[1]: Started logrotate.timer. Feb 9 07:03:47.100611 systemd[1]: Started mdadm.timer. Feb 9 07:03:47.104535 kernel: bond0: (slave enp1s0f1np1): link status up, enabling it in 200 ms Feb 9 07:03:47.104605 kernel: bond0: (slave enp1s0f1np1): invalid new link 3 on slave Feb 9 07:03:47.124591 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 07:03:47.132568 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 07:03:47.132583 systemd[1]: Reached target paths.target. Feb 9 07:03:47.139573 systemd[1]: Reached target timers.target. Feb 9 07:03:47.146709 systemd[1]: Listening on dbus.socket. Feb 9 07:03:47.154114 systemd[1]: Starting docker.socket... Feb 9 07:03:47.161905 systemd[1]: Listening on sshd.socket. Feb 9 07:03:47.168639 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 07:03:47.168863 systemd[1]: Listening on docker.socket. Feb 9 07:03:47.175624 systemd[1]: Reached target sockets.target. Feb 9 07:03:47.183567 systemd[1]: Reached target basic.target. Feb 9 07:03:47.190585 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 07:03:47.190599 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 07:03:47.191040 systemd[1]: Starting containerd.service... Feb 9 07:03:47.197986 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 07:03:47.207053 systemd[1]: Starting coreos-metadata.service... Feb 9 07:03:47.214077 systemd[1]: Starting dbus.service... Feb 9 07:03:47.220147 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 07:03:47.225094 jq[1432]: false Feb 9 07:03:47.227126 systemd[1]: Starting extend-filesystems.service... Feb 9 07:03:47.227358 coreos-metadata[1425]: Feb 09 07:03:47.227 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 07:03:47.233352 dbus-daemon[1431]: [system] SELinux support is enabled Feb 9 07:03:47.233571 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 07:03:47.234203 systemd[1]: Starting motdgen.service... Feb 9 07:03:47.234649 extend-filesystems[1433]: Found sda Feb 9 07:03:47.234649 extend-filesystems[1433]: Found sdb Feb 9 07:03:47.260482 extend-filesystems[1433]: Found sdb1 Feb 9 07:03:47.260482 extend-filesystems[1433]: Found sdb2 Feb 9 07:03:47.260482 extend-filesystems[1433]: Found sdb3 Feb 9 07:03:47.260482 extend-filesystems[1433]: Found usr Feb 9 07:03:47.260482 extend-filesystems[1433]: Found sdb4 Feb 9 07:03:47.260482 extend-filesystems[1433]: Found sdb6 Feb 9 07:03:47.260482 extend-filesystems[1433]: Found sdb7 Feb 9 07:03:47.260482 extend-filesystems[1433]: Found sdb9 Feb 9 07:03:47.260482 extend-filesystems[1433]: Checking size of /dev/sdb9 Feb 9 07:03:47.260482 extend-filesystems[1433]: Resized partition /dev/sdb9 Feb 9 07:03:47.375535 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 9 07:03:47.375556 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 07:03:47.375598 coreos-metadata[1428]: Feb 09 07:03:47.235 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 07:03:47.241243 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 07:03:47.375752 extend-filesystems[1449]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 07:03:47.274239 systemd[1]: Starting prepare-critools.service... Feb 9 07:03:47.288226 systemd[1]: Starting prepare-helm.service... Feb 9 07:03:47.311136 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 07:03:47.349127 systemd[1]: Starting sshd-keygen.service... Feb 9 07:03:47.368978 systemd[1]: Starting systemd-logind.service... Feb 9 07:03:47.382530 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 07:03:47.383125 systemd[1]: Starting tcsd.service... Feb 9 07:03:47.389994 systemd-logind[1462]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 07:03:47.390004 systemd-logind[1462]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 07:03:47.390013 systemd-logind[1462]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 07:03:47.390147 systemd-logind[1462]: New seat seat0. Feb 9 07:03:47.395924 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 07:03:47.396274 systemd[1]: Starting update-engine.service... Feb 9 07:03:47.403062 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 07:03:47.404578 jq[1465]: true Feb 9 07:03:47.411896 systemd[1]: Started dbus.service. Feb 9 07:03:47.420284 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 07:03:47.420373 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 07:03:47.420539 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 07:03:47.420616 systemd[1]: Finished motdgen.service. Feb 9 07:03:47.428608 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 07:03:47.428691 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 07:03:47.434917 tar[1467]: ./ Feb 9 07:03:47.435030 tar[1467]: ./loopback Feb 9 07:03:47.439450 jq[1473]: true Feb 9 07:03:47.439790 dbus-daemon[1431]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 07:03:47.440372 update_engine[1464]: I0209 07:03:47.439899 1464 main.cc:92] Flatcar Update Engine starting Feb 9 07:03:47.440891 tar[1469]: linux-amd64/helm Feb 9 07:03:47.442644 tar[1468]: crictl Feb 9 07:03:47.443639 update_engine[1464]: I0209 07:03:47.443621 1464 update_check_scheduler.cc:74] Next update check in 6m54s Feb 9 07:03:47.445970 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 07:03:47.446092 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 07:03:47.449892 systemd[1]: Started systemd-logind.service. Feb 9 07:03:47.450238 env[1474]: time="2024-02-09T07:03:47.450210635Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 07:03:47.454712 tar[1467]: ./bandwidth Feb 9 07:03:47.459775 systemd[1]: Started update-engine.service. Feb 9 07:03:47.462084 env[1474]: time="2024-02-09T07:03:47.462054316Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 07:03:47.462906 env[1474]: time="2024-02-09T07:03:47.462894226Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 07:03:47.463483 env[1474]: time="2024-02-09T07:03:47.463467265Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 07:03:47.463483 env[1474]: time="2024-02-09T07:03:47.463482361Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 07:03:47.465212 env[1474]: time="2024-02-09T07:03:47.465198675Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 07:03:47.465212 env[1474]: time="2024-02-09T07:03:47.465211018Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 07:03:47.465266 env[1474]: time="2024-02-09T07:03:47.465219150Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 07:03:47.465266 env[1474]: time="2024-02-09T07:03:47.465225860Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 07:03:47.465310 env[1474]: time="2024-02-09T07:03:47.465267413Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 07:03:47.467399 env[1474]: time="2024-02-09T07:03:47.467387283Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 07:03:47.467426 bash[1501]: Updated "/home/core/.ssh/authorized_keys" Feb 9 07:03:47.467538 env[1474]: time="2024-02-09T07:03:47.467456609Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 07:03:47.467538 env[1474]: time="2024-02-09T07:03:47.467466767Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 07:03:47.467538 env[1474]: time="2024-02-09T07:03:47.467501394Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 07:03:47.467538 env[1474]: time="2024-02-09T07:03:47.467509434Z" level=info msg="metadata content store policy set" policy=shared Feb 9 07:03:47.467934 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 07:03:47.473913 env[1474]: time="2024-02-09T07:03:47.473860604Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 07:03:47.473913 env[1474]: time="2024-02-09T07:03:47.473875363Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 07:03:47.473913 env[1474]: time="2024-02-09T07:03:47.473882983Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 07:03:47.473913 env[1474]: time="2024-02-09T07:03:47.473900079Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 07:03:47.473913 env[1474]: time="2024-02-09T07:03:47.473908141Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 07:03:47.474021 env[1474]: time="2024-02-09T07:03:47.473915711Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 07:03:47.474021 env[1474]: time="2024-02-09T07:03:47.473923140Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 07:03:47.474021 env[1474]: time="2024-02-09T07:03:47.473930366Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 07:03:47.474021 env[1474]: time="2024-02-09T07:03:47.473937335Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 07:03:47.474021 env[1474]: time="2024-02-09T07:03:47.473944931Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 07:03:47.474021 env[1474]: time="2024-02-09T07:03:47.473952200Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 07:03:47.474021 env[1474]: time="2024-02-09T07:03:47.473959137Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 07:03:47.474021 env[1474]: time="2024-02-09T07:03:47.474007708Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 07:03:47.474151 env[1474]: time="2024-02-09T07:03:47.474052762Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 07:03:47.474192 env[1474]: time="2024-02-09T07:03:47.474183370Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 07:03:47.474217 env[1474]: time="2024-02-09T07:03:47.474198483Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 07:03:47.474217 env[1474]: time="2024-02-09T07:03:47.474205849Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 07:03:47.474248 env[1474]: time="2024-02-09T07:03:47.474230565Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 07:03:47.474248 env[1474]: time="2024-02-09T07:03:47.474239555Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 07:03:47.474248 env[1474]: time="2024-02-09T07:03:47.474246460Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 07:03:47.474294 env[1474]: time="2024-02-09T07:03:47.474254139Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 07:03:47.474294 env[1474]: time="2024-02-09T07:03:47.474260649Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 07:03:47.474294 env[1474]: time="2024-02-09T07:03:47.474266912Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 07:03:47.474294 env[1474]: time="2024-02-09T07:03:47.474273907Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 07:03:47.474294 env[1474]: time="2024-02-09T07:03:47.474280320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 07:03:47.474294 env[1474]: time="2024-02-09T07:03:47.474287438Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 07:03:47.474400 env[1474]: time="2024-02-09T07:03:47.474347393Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 07:03:47.474400 env[1474]: time="2024-02-09T07:03:47.474355935Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 07:03:47.474400 env[1474]: time="2024-02-09T07:03:47.474362724Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 07:03:47.474400 env[1474]: time="2024-02-09T07:03:47.474368734Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 07:03:47.474400 env[1474]: time="2024-02-09T07:03:47.474376446Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 07:03:47.474400 env[1474]: time="2024-02-09T07:03:47.474382518Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 07:03:47.474400 env[1474]: time="2024-02-09T07:03:47.474392239Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 07:03:47.474508 env[1474]: time="2024-02-09T07:03:47.474412980Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 07:03:47.474595 env[1474]: time="2024-02-09T07:03:47.474536032Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 07:03:47.474595 env[1474]: time="2024-02-09T07:03:47.474567513Z" level=info msg="Connect containerd service" Feb 9 07:03:47.474595 env[1474]: time="2024-02-09T07:03:47.474585048Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 07:03:47.476322 env[1474]: time="2024-02-09T07:03:47.474857843Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 07:03:47.476322 env[1474]: time="2024-02-09T07:03:47.474948222Z" level=info msg="Start subscribing containerd event" Feb 9 07:03:47.476322 env[1474]: time="2024-02-09T07:03:47.474974681Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 07:03:47.476322 env[1474]: time="2024-02-09T07:03:47.474981348Z" level=info msg="Start recovering state" Feb 9 07:03:47.476322 env[1474]: time="2024-02-09T07:03:47.474996322Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 07:03:47.476322 env[1474]: time="2024-02-09T07:03:47.475018865Z" level=info msg="Start event monitor" Feb 9 07:03:47.476322 env[1474]: time="2024-02-09T07:03:47.475019624Z" level=info msg="containerd successfully booted in 0.025218s" Feb 9 07:03:47.476322 env[1474]: time="2024-02-09T07:03:47.475031450Z" level=info msg="Start snapshots syncer" Feb 9 07:03:47.476322 env[1474]: time="2024-02-09T07:03:47.475037212Z" level=info msg="Start cni network conf syncer for default" Feb 9 07:03:47.476322 env[1474]: time="2024-02-09T07:03:47.475041449Z" level=info msg="Start streaming server" Feb 9 07:03:47.478787 systemd[1]: Started containerd.service. Feb 9 07:03:47.488603 tar[1467]: ./ptp Feb 9 07:03:47.488683 systemd[1]: Started locksmithd.service. Feb 9 07:03:47.495663 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 07:03:47.495791 systemd[1]: Reached target system-config.target. Feb 9 07:03:47.503627 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 07:03:47.503744 systemd[1]: Reached target user-config.target. Feb 9 07:03:47.511872 tar[1467]: ./vlan Feb 9 07:03:47.534955 tar[1467]: ./host-device Feb 9 07:03:47.549320 locksmithd[1511]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 07:03:47.556452 tar[1467]: ./tuning Feb 9 07:03:47.575303 tar[1467]: ./vrf Feb 9 07:03:47.595021 tar[1467]: ./sbr Feb 9 07:03:47.614324 tar[1467]: ./tap Feb 9 07:03:47.636457 tar[1467]: ./dhcp Feb 9 07:03:47.692566 tar[1467]: ./static Feb 9 07:03:47.693357 tar[1469]: linux-amd64/LICENSE Feb 9 07:03:47.693402 tar[1469]: linux-amd64/README.md Feb 9 07:03:47.696221 systemd[1]: Finished prepare-helm.service. Feb 9 07:03:47.708587 tar[1467]: ./firewall Feb 9 07:03:47.708763 systemd[1]: Finished prepare-critools.service. Feb 9 07:03:47.733049 tar[1467]: ./macvlan Feb 9 07:03:47.733535 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 9 07:03:47.762361 extend-filesystems[1449]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 9 07:03:47.762361 extend-filesystems[1449]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 07:03:47.762361 extend-filesystems[1449]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 9 07:03:47.802563 extend-filesystems[1433]: Resized filesystem in /dev/sdb9 Feb 9 07:03:47.810536 tar[1467]: ./dummy Feb 9 07:03:47.810536 tar[1467]: ./bridge Feb 9 07:03:47.762772 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 07:03:47.762855 systemd[1]: Finished extend-filesystems.service. Feb 9 07:03:47.829018 tar[1467]: ./ipvlan Feb 9 07:03:47.850969 tar[1467]: ./portmap Feb 9 07:03:47.871227 tar[1467]: ./host-local Feb 9 07:03:47.871570 systemd-networkd[1321]: bond0: Gained IPv6LL Feb 9 07:03:47.896193 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 07:03:47.954152 sshd_keygen[1461]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 07:03:47.965556 systemd[1]: Finished sshd-keygen.service. Feb 9 07:03:47.973328 systemd[1]: Starting issuegen.service... Feb 9 07:03:47.980727 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 07:03:47.980802 systemd[1]: Finished issuegen.service. Feb 9 07:03:47.989242 systemd[1]: Starting systemd-user-sessions.service... Feb 9 07:03:47.998782 systemd[1]: Finished systemd-user-sessions.service. Feb 9 07:03:48.008230 systemd[1]: Started getty@tty1.service. Feb 9 07:03:48.015183 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 07:03:48.023668 systemd[1]: Reached target getty.target. Feb 9 07:03:49.128684 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 07:03:52.480280 coreos-metadata[1425]: Feb 09 07:03:52.480 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 07:03:52.480788 coreos-metadata[1428]: Feb 09 07:03:52.480 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 07:03:53.120381 login[1536]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 07:03:53.121140 login[1535]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 07:03:53.146525 systemd-logind[1462]: New session 1 of user core. Feb 9 07:03:53.150018 systemd[1]: Created slice user-500.slice. Feb 9 07:03:53.152770 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 07:03:53.163172 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 07:03:53.163874 systemd[1]: Starting user@500.service... Feb 9 07:03:53.165727 (systemd)[1540]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:03:53.235699 systemd[1540]: Queued start job for default target default.target. Feb 9 07:03:53.235943 systemd[1540]: Reached target paths.target. Feb 9 07:03:53.235954 systemd[1540]: Reached target sockets.target. Feb 9 07:03:53.235962 systemd[1540]: Reached target timers.target. Feb 9 07:03:53.235969 systemd[1540]: Reached target basic.target. Feb 9 07:03:53.235988 systemd[1540]: Reached target default.target. Feb 9 07:03:53.236002 systemd[1540]: Startup finished in 67ms. Feb 9 07:03:53.236057 systemd[1]: Started user@500.service. Feb 9 07:03:53.236673 systemd[1]: Started session-1.scope. Feb 9 07:03:53.480694 coreos-metadata[1428]: Feb 09 07:03:53.480 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 07:03:53.480973 coreos-metadata[1425]: Feb 09 07:03:53.480 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 07:03:53.484977 coreos-metadata[1425]: Feb 09 07:03:53.484 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 07:03:53.487064 coreos-metadata[1428]: Feb 09 07:03:53.487 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 07:03:54.126050 login[1536]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 07:03:54.128885 systemd-logind[1462]: New session 2 of user core. Feb 9 07:03:54.129343 systemd[1]: Started session-2.scope. Feb 9 07:03:54.614562 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 9 07:03:54.614753 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 9 07:03:55.485302 coreos-metadata[1425]: Feb 09 07:03:55.485 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 9 07:03:55.487288 coreos-metadata[1428]: Feb 09 07:03:55.487 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 9 07:03:55.510574 coreos-metadata[1425]: Feb 09 07:03:55.510 INFO Fetch successful Feb 9 07:03:55.510851 coreos-metadata[1428]: Feb 09 07:03:55.510 INFO Fetch successful Feb 9 07:03:55.532650 systemd[1]: Finished coreos-metadata.service. Feb 9 07:03:55.533152 unknown[1425]: wrote ssh authorized keys file for user: core Feb 9 07:03:55.533590 systemd[1]: Started packet-phone-home.service. Feb 9 07:03:55.540946 curl[1562]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 07:03:55.540946 curl[1562]: Dload Upload Total Spent Left Speed Feb 9 07:03:55.544907 update-ssh-keys[1563]: Updated "/home/core/.ssh/authorized_keys" Feb 9 07:03:55.545111 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 07:03:55.545334 systemd[1]: Reached target multi-user.target. Feb 9 07:03:55.545979 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 07:03:55.549873 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 07:03:55.549942 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 07:03:55.550063 systemd[1]: Startup finished in 1.851s (kernel) + 19.602s (initrd) + 15.114s (userspace) = 36.569s. Feb 9 07:03:55.744205 curl[1562]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 07:03:55.746822 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 07:03:56.321015 systemd[1]: Created slice system-sshd.slice. Feb 9 07:03:56.321686 systemd[1]: Started sshd@0-139.178.90.101:22-147.75.109.163:48722.service. Feb 9 07:03:56.361945 sshd[1566]: Accepted publickey for core from 147.75.109.163 port 48722 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:03:56.363071 sshd[1566]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:03:56.366549 systemd-logind[1462]: New session 3 of user core. Feb 9 07:03:56.367454 systemd[1]: Started session-3.scope. Feb 9 07:03:56.421888 systemd[1]: Started sshd@1-139.178.90.101:22-147.75.109.163:35194.service. Feb 9 07:03:56.449398 sshd[1571]: Accepted publickey for core from 147.75.109.163 port 35194 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:03:56.450128 sshd[1571]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:03:56.452282 systemd-logind[1462]: New session 4 of user core. Feb 9 07:03:56.452823 systemd[1]: Started session-4.scope. Feb 9 07:03:56.503221 sshd[1571]: pam_unix(sshd:session): session closed for user core Feb 9 07:03:56.505316 systemd[1]: sshd@1-139.178.90.101:22-147.75.109.163:35194.service: Deactivated successfully. Feb 9 07:03:56.505825 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 07:03:56.506358 systemd-logind[1462]: Session 4 logged out. Waiting for processes to exit. Feb 9 07:03:56.507335 systemd[1]: Started sshd@2-139.178.90.101:22-147.75.109.163:35198.service. Feb 9 07:03:56.507998 systemd-logind[1462]: Removed session 4. Feb 9 07:03:56.538415 sshd[1577]: Accepted publickey for core from 147.75.109.163 port 35198 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:03:56.539265 sshd[1577]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:03:56.542143 systemd-logind[1462]: New session 5 of user core. Feb 9 07:03:56.543168 systemd[1]: Started session-5.scope. Feb 9 07:03:56.595460 sshd[1577]: pam_unix(sshd:session): session closed for user core Feb 9 07:03:56.597341 systemd[1]: sshd@2-139.178.90.101:22-147.75.109.163:35198.service: Deactivated successfully. Feb 9 07:03:56.597734 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 07:03:56.598107 systemd-logind[1462]: Session 5 logged out. Waiting for processes to exit. Feb 9 07:03:56.598644 systemd[1]: Started sshd@3-139.178.90.101:22-147.75.109.163:35214.service. Feb 9 07:03:56.599187 systemd-logind[1462]: Removed session 5. Feb 9 07:03:56.627615 sshd[1583]: Accepted publickey for core from 147.75.109.163 port 35214 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:03:56.628652 sshd[1583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:03:56.632167 systemd-logind[1462]: New session 6 of user core. Feb 9 07:03:56.633478 systemd[1]: Started session-6.scope. Feb 9 07:03:56.689891 sshd[1583]: pam_unix(sshd:session): session closed for user core Feb 9 07:03:56.691532 systemd[1]: sshd@3-139.178.90.101:22-147.75.109.163:35214.service: Deactivated successfully. Feb 9 07:03:56.691897 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 07:03:56.692224 systemd-logind[1462]: Session 6 logged out. Waiting for processes to exit. Feb 9 07:03:56.692751 systemd[1]: Started sshd@4-139.178.90.101:22-147.75.109.163:35226.service. Feb 9 07:03:56.693193 systemd-logind[1462]: Removed session 6. Feb 9 07:03:56.721855 sshd[1589]: Accepted publickey for core from 147.75.109.163 port 35226 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:03:56.722796 sshd[1589]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:03:56.726133 systemd-logind[1462]: New session 7 of user core. Feb 9 07:03:56.727305 systemd[1]: Started session-7.scope. Feb 9 07:03:56.808087 sudo[1592]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 07:03:56.808699 sudo[1592]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 07:03:56.829895 dbus-daemon[1431]: н\x88'`U: received setenforce notice (enforcing=775292480) Feb 9 07:03:56.834723 sudo[1592]: pam_unix(sudo:session): session closed for user root Feb 9 07:03:56.839910 sshd[1589]: pam_unix(sshd:session): session closed for user core Feb 9 07:03:56.848759 systemd[1]: sshd@4-139.178.90.101:22-147.75.109.163:35226.service: Deactivated successfully. Feb 9 07:03:56.850778 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 07:03:56.852973 systemd-logind[1462]: Session 7 logged out. Waiting for processes to exit. Feb 9 07:03:56.855915 systemd[1]: Started sshd@5-139.178.90.101:22-147.75.109.163:35242.service. Feb 9 07:03:56.858728 systemd-logind[1462]: Removed session 7. Feb 9 07:03:56.918854 sshd[1596]: Accepted publickey for core from 147.75.109.163 port 35242 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:03:56.921723 sshd[1596]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:03:56.931012 systemd-logind[1462]: New session 8 of user core. Feb 9 07:03:56.934339 systemd[1]: Started session-8.scope. Feb 9 07:03:57.010072 sudo[1600]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 07:03:57.010694 sudo[1600]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 07:03:57.017822 sudo[1600]: pam_unix(sudo:session): session closed for user root Feb 9 07:03:57.030155 sudo[1599]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 07:03:57.030744 sudo[1599]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 07:03:57.054830 systemd[1]: Stopping audit-rules.service... Feb 9 07:03:57.056000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 07:03:57.057761 auditctl[1603]: No rules Feb 9 07:03:57.058462 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 07:03:57.058872 systemd[1]: Stopped audit-rules.service. Feb 9 07:03:57.062658 systemd[1]: Starting audit-rules.service... Feb 9 07:03:57.063208 kernel: kauditd_printk_skb: 95 callbacks suppressed Feb 9 07:03:57.063372 kernel: audit: type=1305 audit(1707462237.056:158): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 07:03:57.056000 audit[1603]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe74235500 a2=420 a3=0 items=0 ppid=1 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:03:57.092198 augenrules[1620]: No rules Feb 9 07:03:57.092781 systemd[1]: Finished audit-rules.service. Feb 9 07:03:57.093487 sudo[1599]: pam_unix(sudo:session): session closed for user root Feb 9 07:03:57.094554 sshd[1596]: pam_unix(sshd:session): session closed for user core Feb 9 07:03:57.096813 systemd[1]: sshd@5-139.178.90.101:22-147.75.109.163:35242.service: Deactivated successfully. Feb 9 07:03:57.097328 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 07:03:57.097915 systemd-logind[1462]: Session 8 logged out. Waiting for processes to exit. Feb 9 07:03:57.098656 systemd[1]: Started sshd@6-139.178.90.101:22-147.75.109.163:35248.service. Feb 9 07:03:57.099300 systemd-logind[1462]: Removed session 8. Feb 9 07:03:57.110179 kernel: audit: type=1300 audit(1707462237.056:158): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe74235500 a2=420 a3=0 items=0 ppid=1 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:03:57.110219 kernel: audit: type=1327 audit(1707462237.056:158): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 07:03:57.056000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 07:03:57.119708 kernel: audit: type=1131 audit(1707462237.058:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:57.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:57.142194 kernel: audit: type=1130 audit(1707462237.092:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:57.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:57.142449 sshd[1626]: Accepted publickey for core from 147.75.109.163 port 35248 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:03:57.143176 sshd[1626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:03:57.145382 systemd-logind[1462]: New session 9 of user core. Feb 9 07:03:57.146054 systemd[1]: Started session-9.scope. Feb 9 07:03:57.164646 kernel: audit: type=1106 audit(1707462237.092:161): pid=1599 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 07:03:57.092000 audit[1599]: USER_END pid=1599 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 07:03:57.190626 kernel: audit: type=1104 audit(1707462237.093:162): pid=1599 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 07:03:57.093000 audit[1599]: CRED_DISP pid=1599 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 07:03:57.192597 sudo[1629]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 07:03:57.192704 sudo[1629]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 07:03:57.214191 kernel: audit: type=1106 audit(1707462237.094:163): pid=1596 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:03:57.094000 audit[1596]: USER_END pid=1596 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:03:57.246345 kernel: audit: type=1104 audit(1707462237.095:164): pid=1596 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:03:57.095000 audit[1596]: CRED_DISP pid=1596 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:03:57.272324 kernel: audit: type=1131 audit(1707462237.096:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.90.101:22-147.75.109.163:35242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:57.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.90.101:22-147.75.109.163:35242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:57.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.101:22-147.75.109.163:35248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:57.141000 audit[1626]: USER_ACCT pid=1626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:03:57.142000 audit[1626]: CRED_ACQ pid=1626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:03:57.142000 audit[1626]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6cf598a0 a2=3 a3=0 items=0 ppid=1 pid=1626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:03:57.142000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:03:57.147000 audit[1626]: USER_START pid=1626 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:03:57.148000 audit[1628]: CRED_ACQ pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:03:57.191000 audit[1629]: USER_ACCT pid=1629 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 07:03:57.192000 audit[1629]: CRED_REFR pid=1629 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 07:03:57.193000 audit[1629]: USER_START pid=1629 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 07:04:01.234067 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 07:04:01.238016 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 07:04:01.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:01.238313 systemd[1]: Reached target network-online.target. Feb 9 07:04:01.239121 systemd[1]: Starting docker.service... Feb 9 07:04:01.260341 env[1649]: time="2024-02-09T07:04:01.260284711Z" level=info msg="Starting up" Feb 9 07:04:01.261024 env[1649]: time="2024-02-09T07:04:01.260990711Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 07:04:01.261024 env[1649]: time="2024-02-09T07:04:01.260999114Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 07:04:01.261075 env[1649]: time="2024-02-09T07:04:01.261028487Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 07:04:01.261075 env[1649]: time="2024-02-09T07:04:01.261034535Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 07:04:01.262122 env[1649]: time="2024-02-09T07:04:01.262091271Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 07:04:01.262122 env[1649]: time="2024-02-09T07:04:01.262100580Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 07:04:01.262122 env[1649]: time="2024-02-09T07:04:01.262109342Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 07:04:01.262122 env[1649]: time="2024-02-09T07:04:01.262114337Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 07:04:01.276673 env[1649]: time="2024-02-09T07:04:01.276626055Z" level=info msg="Loading containers: start." Feb 9 07:04:01.305000 audit[1696]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.305000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc7a1155a0 a2=0 a3=7ffc7a11558c items=0 ppid=1649 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.305000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 07:04:01.306000 audit[1698]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.306000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe0ea1e040 a2=0 a3=7ffe0ea1e02c items=0 ppid=1649 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.306000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 07:04:01.307000 audit[1700]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.307000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff567a4820 a2=0 a3=7fff567a480c items=0 ppid=1649 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.307000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 07:04:01.308000 audit[1702]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.308000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd86eae390 a2=0 a3=7ffd86eae37c items=0 ppid=1649 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.308000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 07:04:01.310000 audit[1704]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.310000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc68645cb0 a2=0 a3=7ffc68645c9c items=0 ppid=1649 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.310000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 07:04:01.356000 audit[1709]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.356000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcb068cc90 a2=0 a3=7ffcb068cc7c items=0 ppid=1649 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.356000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 07:04:01.371000 audit[1711]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.371000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc96208530 a2=0 a3=7ffc9620851c items=0 ppid=1649 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.371000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 07:04:01.376000 audit[1713]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.376000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc5c6cda80 a2=0 a3=7ffc5c6cda6c items=0 ppid=1649 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.376000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 07:04:01.380000 audit[1715]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.380000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc643d29c0 a2=0 a3=7ffc643d29ac items=0 ppid=1649 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.380000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 07:04:01.394000 audit[1719]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.394000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc8ffb70c0 a2=0 a3=7ffc8ffb70ac items=0 ppid=1649 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.394000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 07:04:01.396000 audit[1720]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.396000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffde02822e0 a2=0 a3=7ffde02822cc items=0 ppid=1649 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.396000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 07:04:01.420523 kernel: Initializing XFRM netlink socket Feb 9 07:04:01.456793 env[1649]: time="2024-02-09T07:04:01.456774507Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 07:04:01.457468 systemd-timesyncd[1418]: Network configuration changed, trying to establish connection. Feb 9 07:04:01.467000 audit[1728]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.467000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff82673070 a2=0 a3=7fff8267305c items=0 ppid=1649 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.467000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 07:04:01.484000 audit[1731]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.484000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffeadf1d450 a2=0 a3=7ffeadf1d43c items=0 ppid=1649 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.484000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 07:04:01.485000 audit[1734]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.485000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe74251020 a2=0 a3=7ffe7425100c items=0 ppid=1649 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.485000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 07:04:01.486000 audit[1736]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.486000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffed7091e50 a2=0 a3=7ffed7091e3c items=0 ppid=1649 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.486000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 07:04:01.487000 audit[1738]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.487000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd28b18330 a2=0 a3=7ffd28b1831c items=0 ppid=1649 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.487000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 07:04:01.488000 audit[1740]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.488000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc159a46d0 a2=0 a3=7ffc159a46bc items=0 ppid=1649 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.488000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 07:04:01.489000 audit[1742]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.489000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff74591160 a2=0 a3=7fff7459114c items=0 ppid=1649 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.489000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 07:04:01.494000 audit[1745]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.494000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd7e46d2d0 a2=0 a3=7ffd7e46d2bc items=0 ppid=1649 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.494000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 07:04:01.495000 audit[1747]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.495000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcd39e2530 a2=0 a3=7ffcd39e251c items=0 ppid=1649 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.495000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 07:04:01.496000 audit[1749]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.496000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffee4a4a0e0 a2=0 a3=7ffee4a4a0cc items=0 ppid=1649 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.496000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 07:04:01.497000 audit[1751]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.497000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffe7416c50 a2=0 a3=7fffe7416c3c items=0 ppid=1649 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.497000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 07:04:01.498334 systemd-networkd[1321]: docker0: Link UP Feb 9 07:04:01.501000 audit[1755]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.501000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffee0a880f0 a2=0 a3=7ffee0a880dc items=0 ppid=1649 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.501000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 07:04:01.502000 audit[1756]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:01.502000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcf8838f60 a2=0 a3=7ffcf8838f4c items=0 ppid=1649 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:01.502000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 07:04:01.502800 env[1649]: time="2024-02-09T07:04:01.502756321Z" level=info msg="Loading containers: done." Feb 9 07:04:01.509721 env[1649]: time="2024-02-09T07:04:01.509678561Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 07:04:01.509802 env[1649]: time="2024-02-09T07:04:01.509757095Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 07:04:01.509826 env[1649]: time="2024-02-09T07:04:01.509803479Z" level=info msg="Daemon has completed initialization" Feb 9 07:04:01.515825 systemd[1]: Started docker.service. Feb 9 07:04:01.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:01.518867 env[1649]: time="2024-02-09T07:04:01.518844305Z" level=info msg="API listen on /run/docker.sock" Feb 9 07:04:01.529863 systemd[1]: Reloading. Feb 9 07:04:01.573325 /usr/lib/systemd/system-generators/torcx-generator[1807]: time="2024-02-09T07:04:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 07:04:01.573346 /usr/lib/systemd/system-generators/torcx-generator[1807]: time="2024-02-09T07:04:01Z" level=info msg="torcx already run" Feb 9 07:04:01.627404 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 07:04:01.627413 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 07:04:01.640544 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 07:04:01.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.687000 audit: BPF prog-id=31 op=LOAD Feb 9 07:04:01.687000 audit: BPF prog-id=24 op=UNLOAD Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit: BPF prog-id=32 op=LOAD Feb 9 07:04:01.688000 audit: BPF prog-id=21 op=UNLOAD Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit: BPF prog-id=33 op=LOAD Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.688000 audit: BPF prog-id=34 op=LOAD Feb 9 07:04:01.688000 audit: BPF prog-id=22 op=UNLOAD Feb 9 07:04:01.688000 audit: BPF prog-id=23 op=UNLOAD Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit: BPF prog-id=35 op=LOAD Feb 9 07:04:01.689000 audit: BPF prog-id=15 op=UNLOAD Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit: BPF prog-id=36 op=LOAD Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.689000 audit: BPF prog-id=37 op=LOAD Feb 9 07:04:01.689000 audit: BPF prog-id=16 op=UNLOAD Feb 9 07:04:01.689000 audit: BPF prog-id=17 op=UNLOAD Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit: BPF prog-id=38 op=LOAD Feb 9 07:04:01.690000 audit: BPF prog-id=26 op=UNLOAD Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit: BPF prog-id=39 op=LOAD Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit: BPF prog-id=40 op=LOAD Feb 9 07:04:01.690000 audit: BPF prog-id=27 op=UNLOAD Feb 9 07:04:01.690000 audit: BPF prog-id=28 op=UNLOAD Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.690000 audit: BPF prog-id=41 op=LOAD Feb 9 07:04:01.690000 audit: BPF prog-id=25 op=UNLOAD Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit: BPF prog-id=42 op=LOAD Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.691000 audit: BPF prog-id=43 op=LOAD Feb 9 07:04:01.691000 audit: BPF prog-id=18 op=UNLOAD Feb 9 07:04:01.691000 audit: BPF prog-id=19 op=UNLOAD Feb 9 07:04:01.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.692000 audit: BPF prog-id=44 op=LOAD Feb 9 07:04:01.692000 audit: BPF prog-id=20 op=UNLOAD Feb 9 07:04:01.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:01.693000 audit: BPF prog-id=45 op=LOAD Feb 9 07:04:01.693000 audit: BPF prog-id=29 op=UNLOAD Feb 9 07:04:01.699522 systemd[1]: Started kubelet.service. Feb 9 07:04:01.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:01.722304 kubelet[1864]: E0209 07:04:01.722250 1864 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 07:04:01.723551 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 07:04:01.723622 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 07:04:01.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 07:04:01.733809 systemd-timesyncd[1418]: Contacted time server [2604:a880:400:d0::83:2002]:123 (2.flatcar.pool.ntp.org). Feb 9 07:04:01.733837 systemd-timesyncd[1418]: Initial clock synchronization to Fri 2024-02-09 07:04:01.750043 UTC. Feb 9 07:04:02.309448 env[1474]: time="2024-02-09T07:04:02.309367223Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 9 07:04:03.002686 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3205139879.mount: Deactivated successfully. Feb 9 07:04:04.886307 env[1474]: time="2024-02-09T07:04:04.886249654Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:04.886852 env[1474]: time="2024-02-09T07:04:04.886813029Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:04.888481 env[1474]: time="2024-02-09T07:04:04.888442339Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:04.889401 env[1474]: time="2024-02-09T07:04:04.889388045Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:04.889871 env[1474]: time="2024-02-09T07:04:04.889828978Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47\"" Feb 9 07:04:04.899354 env[1474]: time="2024-02-09T07:04:04.899334058Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 9 07:04:07.818237 env[1474]: time="2024-02-09T07:04:07.818212503Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:07.818889 env[1474]: time="2024-02-09T07:04:07.818878454Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:07.819866 env[1474]: time="2024-02-09T07:04:07.819854820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:07.820941 env[1474]: time="2024-02-09T07:04:07.820872637Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:07.821513 env[1474]: time="2024-02-09T07:04:07.821451258Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c\"" Feb 9 07:04:07.827316 env[1474]: time="2024-02-09T07:04:07.827285125Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 9 07:04:09.151189 env[1474]: time="2024-02-09T07:04:09.151141927Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:09.151805 env[1474]: time="2024-02-09T07:04:09.151770676Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:09.152692 env[1474]: time="2024-02-09T07:04:09.152652481Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:09.153526 env[1474]: time="2024-02-09T07:04:09.153468806Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:09.153987 env[1474]: time="2024-02-09T07:04:09.153939217Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe\"" Feb 9 07:04:09.159685 env[1474]: time="2024-02-09T07:04:09.159650930Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 9 07:04:09.999162 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2817947707.mount: Deactivated successfully. Feb 9 07:04:10.457607 env[1474]: time="2024-02-09T07:04:10.457581626Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:10.458257 env[1474]: time="2024-02-09T07:04:10.458243767Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:10.458933 env[1474]: time="2024-02-09T07:04:10.458907737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:10.459889 env[1474]: time="2024-02-09T07:04:10.459860410Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:10.460078 env[1474]: time="2024-02-09T07:04:10.460031119Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 9 07:04:10.465564 env[1474]: time="2024-02-09T07:04:10.465546937Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 07:04:11.057449 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3121803293.mount: Deactivated successfully. Feb 9 07:04:11.058762 env[1474]: time="2024-02-09T07:04:11.058717776Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:11.059335 env[1474]: time="2024-02-09T07:04:11.059301113Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:11.060161 env[1474]: time="2024-02-09T07:04:11.060131370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:11.060795 env[1474]: time="2024-02-09T07:04:11.060754597Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:11.061381 env[1474]: time="2024-02-09T07:04:11.061339932Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 07:04:11.066603 env[1474]: time="2024-02-09T07:04:11.066588209Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 9 07:04:11.581746 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3683551689.mount: Deactivated successfully. Feb 9 07:04:11.768701 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 07:04:11.768919 systemd[1]: Stopped kubelet.service. Feb 9 07:04:11.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:11.770117 systemd[1]: Started kubelet.service. Feb 9 07:04:11.774606 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 9 07:04:11.774660 kernel: audit: type=1130 audit(1707462251.767:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:11.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:11.803982 kubelet[1955]: E0209 07:04:11.803915 1955 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 07:04:11.806115 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 07:04:11.806182 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 07:04:11.835757 kernel: audit: type=1131 audit(1707462251.767:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:11.835803 kernel: audit: type=1130 audit(1707462251.768:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:11.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:11.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 07:04:11.947870 kernel: audit: type=1131 audit(1707462251.804:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 07:04:14.751118 env[1474]: time="2024-02-09T07:04:14.751061117Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:14.751712 env[1474]: time="2024-02-09T07:04:14.751672888Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:14.752769 env[1474]: time="2024-02-09T07:04:14.752712962Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:14.753868 env[1474]: time="2024-02-09T07:04:14.753812195Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:14.754420 env[1474]: time="2024-02-09T07:04:14.754385549Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Feb 9 07:04:14.761126 env[1474]: time="2024-02-09T07:04:14.761071869Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 07:04:15.299259 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1610656644.mount: Deactivated successfully. Feb 9 07:04:15.741142 env[1474]: time="2024-02-09T07:04:15.741063360Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:15.741778 env[1474]: time="2024-02-09T07:04:15.741762298Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:15.742394 env[1474]: time="2024-02-09T07:04:15.742381352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:15.742989 env[1474]: time="2024-02-09T07:04:15.742975836Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:15.743318 env[1474]: time="2024-02-09T07:04:15.743291345Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 07:04:17.435530 systemd[1]: Stopped kubelet.service. Feb 9 07:04:17.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:17.445679 systemd[1]: Reloading. Feb 9 07:04:17.478597 /usr/lib/systemd/system-generators/torcx-generator[2120]: time="2024-02-09T07:04:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 07:04:17.478620 /usr/lib/systemd/system-generators/torcx-generator[2120]: time="2024-02-09T07:04:17Z" level=info msg="torcx already run" Feb 9 07:04:17.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:17.555580 kernel: audit: type=1130 audit(1707462257.435:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:17.555634 kernel: audit: type=1131 audit(1707462257.435:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:17.574381 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 07:04:17.574388 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 07:04:17.585074 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 07:04:17.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.753522 kernel: audit: type=1400 audit(1707462257.630:381): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.753588 kernel: audit: type=1400 audit(1707462257.630:382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.753602 kernel: audit: type=1400 audit(1707462257.630:383): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.880983 kernel: audit: type=1400 audit(1707462257.630:384): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.881550 kernel: audit: type=1400 audit(1707462257.630:385): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.008370 kernel: audit: type=1400 audit(1707462257.630:386): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.008429 kernel: audit: type=1400 audit(1707462257.630:387): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.072986 kernel: audit: type=1400 audit(1707462257.630:388): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.753000 audit: BPF prog-id=46 op=LOAD Feb 9 07:04:17.753000 audit: BPF prog-id=31 op=UNLOAD Feb 9 07:04:17.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.879000 audit: BPF prog-id=47 op=LOAD Feb 9 07:04:17.879000 audit: BPF prog-id=32 op=UNLOAD Feb 9 07:04:17.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:17.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.071000 audit: BPF prog-id=48 op=LOAD Feb 9 07:04:18.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.136000 audit: BPF prog-id=49 op=LOAD Feb 9 07:04:18.136000 audit: BPF prog-id=33 op=UNLOAD Feb 9 07:04:18.136000 audit: BPF prog-id=34 op=UNLOAD Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit: BPF prog-id=50 op=LOAD Feb 9 07:04:18.137000 audit: BPF prog-id=35 op=UNLOAD Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit: BPF prog-id=51 op=LOAD Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.137000 audit: BPF prog-id=52 op=LOAD Feb 9 07:04:18.137000 audit: BPF prog-id=36 op=UNLOAD Feb 9 07:04:18.137000 audit: BPF prog-id=37 op=UNLOAD Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit: BPF prog-id=53 op=LOAD Feb 9 07:04:18.138000 audit: BPF prog-id=38 op=UNLOAD Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit: BPF prog-id=54 op=LOAD Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit: BPF prog-id=55 op=LOAD Feb 9 07:04:18.138000 audit: BPF prog-id=39 op=UNLOAD Feb 9 07:04:18.138000 audit: BPF prog-id=40 op=UNLOAD Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit: BPF prog-id=56 op=LOAD Feb 9 07:04:18.139000 audit: BPF prog-id=41 op=UNLOAD Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit: BPF prog-id=57 op=LOAD Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.139000 audit: BPF prog-id=58 op=LOAD Feb 9 07:04:18.139000 audit: BPF prog-id=42 op=UNLOAD Feb 9 07:04:18.139000 audit: BPF prog-id=43 op=UNLOAD Feb 9 07:04:18.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.141000 audit: BPF prog-id=59 op=LOAD Feb 9 07:04:18.141000 audit: BPF prog-id=44 op=UNLOAD Feb 9 07:04:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.141000 audit: BPF prog-id=60 op=LOAD Feb 9 07:04:18.141000 audit: BPF prog-id=45 op=UNLOAD Feb 9 07:04:18.149394 systemd[1]: Started kubelet.service. Feb 9 07:04:18.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:18.172040 kubelet[2181]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 07:04:18.172040 kubelet[2181]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 07:04:18.172040 kubelet[2181]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 07:04:18.172040 kubelet[2181]: I0209 07:04:18.172034 2181 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 07:04:18.276583 kubelet[2181]: I0209 07:04:18.276543 2181 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 07:04:18.276583 kubelet[2181]: I0209 07:04:18.276556 2181 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 07:04:18.276664 kubelet[2181]: I0209 07:04:18.276654 2181 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 07:04:18.278498 kubelet[2181]: I0209 07:04:18.278458 2181 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 07:04:18.279220 kubelet[2181]: E0209 07:04:18.279184 2181 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.90.101:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.90.101:6443: connect: connection refused Feb 9 07:04:18.308299 kubelet[2181]: I0209 07:04:18.308267 2181 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 07:04:18.308638 kubelet[2181]: I0209 07:04:18.308616 2181 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 07:04:18.308916 kubelet[2181]: I0209 07:04:18.308891 2181 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 07:04:18.309132 kubelet[2181]: I0209 07:04:18.308934 2181 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 07:04:18.309132 kubelet[2181]: I0209 07:04:18.308953 2181 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 07:04:18.309132 kubelet[2181]: I0209 07:04:18.309127 2181 state_mem.go:36] "Initialized new in-memory state store" Feb 9 07:04:18.309323 kubelet[2181]: I0209 07:04:18.309263 2181 kubelet.go:393] "Attempting to sync node with API server" Feb 9 07:04:18.309323 kubelet[2181]: I0209 07:04:18.309288 2181 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 07:04:18.309443 kubelet[2181]: I0209 07:04:18.309354 2181 kubelet.go:309] "Adding apiserver pod source" Feb 9 07:04:18.309443 kubelet[2181]: I0209 07:04:18.309379 2181 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 07:04:18.310346 kubelet[2181]: W0209 07:04:18.310214 2181 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.90.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-91c0951621&limit=500&resourceVersion=0": dial tcp 139.178.90.101:6443: connect: connection refused Feb 9 07:04:18.310512 kubelet[2181]: E0209 07:04:18.310342 2181 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.90.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-91c0951621&limit=500&resourceVersion=0": dial tcp 139.178.90.101:6443: connect: connection refused Feb 9 07:04:18.310512 kubelet[2181]: I0209 07:04:18.310372 2181 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 07:04:18.310884 kubelet[2181]: W0209 07:04:18.310384 2181 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.90.101:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.90.101:6443: connect: connection refused Feb 9 07:04:18.311173 kubelet[2181]: E0209 07:04:18.311109 2181 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.90.101:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.90.101:6443: connect: connection refused Feb 9 07:04:18.311707 kubelet[2181]: W0209 07:04:18.311643 2181 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 07:04:18.313842 kubelet[2181]: I0209 07:04:18.313808 2181 server.go:1232] "Started kubelet" Feb 9 07:04:18.314001 kubelet[2181]: I0209 07:04:18.313900 2181 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 07:04:18.314123 kubelet[2181]: I0209 07:04:18.314049 2181 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 07:04:18.314529 kubelet[2181]: E0209 07:04:18.314310 2181 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-91c0951621.17b21fe09e2dacd7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-91c0951621", UID:"ci-3510.3.2-a-91c0951621", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-91c0951621"}, FirstTimestamp:time.Date(2024, time.February, 9, 7, 4, 18, 313768151, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 7, 4, 18, 313768151, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-91c0951621"}': 'Post "https://139.178.90.101:6443/api/v1/namespaces/default/events": dial tcp 139.178.90.101:6443: connect: connection refused'(may retry after sleeping) Feb 9 07:04:18.314817 kubelet[2181]: I0209 07:04:18.314561 2181 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 07:04:18.314817 kubelet[2181]: E0209 07:04:18.314589 2181 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 07:04:18.314817 kubelet[2181]: E0209 07:04:18.314650 2181 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 07:04:18.314000 audit[2181]: AVC avc: denied { mac_admin } for pid=2181 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.314000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 07:04:18.314000 audit[2181]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005e8cf0 a1=c00095e948 a2=c0005e8cc0 a3=25 items=0 ppid=1 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.314000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 07:04:18.314000 audit[2181]: AVC avc: denied { mac_admin } for pid=2181 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.314000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 07:04:18.314000 audit[2181]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00012bd80 a1=c00095e960 a2=c0005e8d80 a3=25 items=0 ppid=1 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.314000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 07:04:18.317054 kubelet[2181]: I0209 07:04:18.315906 2181 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 07:04:18.317054 kubelet[2181]: I0209 07:04:18.316064 2181 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 07:04:18.317054 kubelet[2181]: I0209 07:04:18.316190 2181 server.go:462] "Adding debug handlers to kubelet server" Feb 9 07:04:18.317054 kubelet[2181]: I0209 07:04:18.316232 2181 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 07:04:18.317054 kubelet[2181]: I0209 07:04:18.316372 2181 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 07:04:18.317054 kubelet[2181]: I0209 07:04:18.316545 2181 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 07:04:18.317054 kubelet[2181]: I0209 07:04:18.316704 2181 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 07:04:18.317685 kubelet[2181]: E0209 07:04:18.317245 2181 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.90.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-91c0951621?timeout=10s\": dial tcp 139.178.90.101:6443: connect: connection refused" interval="200ms" Feb 9 07:04:18.317685 kubelet[2181]: W0209 07:04:18.317227 2181 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.90.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.90.101:6443: connect: connection refused Feb 9 07:04:18.317685 kubelet[2181]: E0209 07:04:18.317357 2181 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.90.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.90.101:6443: connect: connection refused Feb 9 07:04:18.317000 audit[2204]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:18.317000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc59537300 a2=0 a3=7ffc595372ec items=0 ppid=2181 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 07:04:18.318000 audit[2205]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:18.318000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeda7e8fc0 a2=0 a3=7ffeda7e8fac items=0 ppid=2181 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.318000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 07:04:18.319000 audit[2207]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:18.319000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe8708ca60 a2=0 a3=7ffe8708ca4c items=0 ppid=2181 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 07:04:18.320000 audit[2213]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:18.320000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc4645eb40 a2=0 a3=7ffc4645eb2c items=0 ppid=2181 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.320000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 07:04:18.323000 audit[2216]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:18.323000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdec978180 a2=0 a3=7ffdec97816c items=0 ppid=2181 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 07:04:18.325287 kubelet[2181]: I0209 07:04:18.325273 2181 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 07:04:18.324000 audit[2217]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:18.324000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdd38f3f70 a2=0 a3=7ffdd38f3f5c items=0 ppid=2181 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 07:04:18.324000 audit[2218]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:18.324000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3b1aea10 a2=0 a3=7ffe3b1ae9fc items=0 ppid=2181 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.324000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 07:04:18.325868 kubelet[2181]: I0209 07:04:18.325759 2181 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 07:04:18.325868 kubelet[2181]: I0209 07:04:18.325777 2181 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 07:04:18.325868 kubelet[2181]: I0209 07:04:18.325786 2181 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 07:04:18.325868 kubelet[2181]: E0209 07:04:18.325817 2181 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 07:04:18.326133 kubelet[2181]: W0209 07:04:18.326080 2181 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.90.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.90.101:6443: connect: connection refused Feb 9 07:04:18.326133 kubelet[2181]: E0209 07:04:18.326115 2181 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.90.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.90.101:6443: connect: connection refused Feb 9 07:04:18.324000 audit[2220]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:18.324000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe44287b30 a2=0 a3=7ffe44287b1c items=0 ppid=2181 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.324000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 07:04:18.324000 audit[2221]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:18.324000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1b9ea030 a2=0 a3=7ffc1b9ea01c items=0 ppid=2181 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 07:04:18.325000 audit[2222]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:18.325000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1bfb77f0 a2=0 a3=7ffc1bfb77dc items=0 ppid=2181 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 07:04:18.325000 audit[2223]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:18.325000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff13c82720 a2=0 a3=7fff13c8270c items=0 ppid=2181 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 07:04:18.325000 audit[2224]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:18.325000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffff1a87b00 a2=0 a3=7ffff1a87aec items=0 ppid=2181 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 07:04:18.330593 kubelet[2181]: I0209 07:04:18.330565 2181 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 07:04:18.330593 kubelet[2181]: I0209 07:04:18.330573 2181 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 07:04:18.330593 kubelet[2181]: I0209 07:04:18.330580 2181 state_mem.go:36] "Initialized new in-memory state store" Feb 9 07:04:18.331255 kubelet[2181]: I0209 07:04:18.331248 2181 policy_none.go:49] "None policy: Start" Feb 9 07:04:18.331509 kubelet[2181]: I0209 07:04:18.331500 2181 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 07:04:18.331538 kubelet[2181]: I0209 07:04:18.331513 2181 state_mem.go:35] "Initializing new in-memory state store" Feb 9 07:04:18.333723 systemd[1]: Created slice kubepods.slice. Feb 9 07:04:18.335736 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 07:04:18.337029 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 07:04:18.348914 kubelet[2181]: I0209 07:04:18.348872 2181 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 07:04:18.347000 audit[2181]: AVC avc: denied { mac_admin } for pid=2181 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:18.347000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 07:04:18.347000 audit[2181]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005e9110 a1=c000558de0 a2=c0005e90e0 a3=25 items=0 ppid=1 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:18.347000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 07:04:18.349678 kubelet[2181]: I0209 07:04:18.348980 2181 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 07:04:18.349678 kubelet[2181]: I0209 07:04:18.349360 2181 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 07:04:18.350202 kubelet[2181]: E0209 07:04:18.350130 2181 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-91c0951621\" not found" Feb 9 07:04:18.420913 kubelet[2181]: I0209 07:04:18.420828 2181 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.421588 kubelet[2181]: E0209 07:04:18.421533 2181 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.90.101:6443/api/v1/nodes\": dial tcp 139.178.90.101:6443: connect: connection refused" node="ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.426812 kubelet[2181]: I0209 07:04:18.426727 2181 topology_manager.go:215] "Topology Admit Handler" podUID="8f2dae335dfad7c75918e1b204ca0074" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.430007 kubelet[2181]: I0209 07:04:18.429931 2181 topology_manager.go:215] "Topology Admit Handler" podUID="be846ac9e98188b335f0030d443f7572" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.433519 kubelet[2181]: I0209 07:04:18.433463 2181 topology_manager.go:215] "Topology Admit Handler" podUID="fab521b3cc318ee80335cf2eab075fb7" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.444360 systemd[1]: Created slice kubepods-burstable-pod8f2dae335dfad7c75918e1b204ca0074.slice. Feb 9 07:04:18.479667 systemd[1]: Created slice kubepods-burstable-podbe846ac9e98188b335f0030d443f7572.slice. Feb 9 07:04:18.488237 systemd[1]: Created slice kubepods-burstable-podfab521b3cc318ee80335cf2eab075fb7.slice. Feb 9 07:04:18.518254 kubelet[2181]: E0209 07:04:18.518164 2181 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.90.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-91c0951621?timeout=10s\": dial tcp 139.178.90.101:6443: connect: connection refused" interval="400ms" Feb 9 07:04:18.617866 kubelet[2181]: I0209 07:04:18.617664 2181 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/be846ac9e98188b335f0030d443f7572-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-91c0951621\" (UID: \"be846ac9e98188b335f0030d443f7572\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.617866 kubelet[2181]: I0209 07:04:18.617769 2181 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8f2dae335dfad7c75918e1b204ca0074-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-91c0951621\" (UID: \"8f2dae335dfad7c75918e1b204ca0074\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.617866 kubelet[2181]: I0209 07:04:18.617835 2181 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/be846ac9e98188b335f0030d443f7572-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-91c0951621\" (UID: \"be846ac9e98188b335f0030d443f7572\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.618338 kubelet[2181]: I0209 07:04:18.617891 2181 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/be846ac9e98188b335f0030d443f7572-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-91c0951621\" (UID: \"be846ac9e98188b335f0030d443f7572\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.618338 kubelet[2181]: I0209 07:04:18.617985 2181 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/be846ac9e98188b335f0030d443f7572-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-91c0951621\" (UID: \"be846ac9e98188b335f0030d443f7572\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.618338 kubelet[2181]: I0209 07:04:18.618049 2181 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fab521b3cc318ee80335cf2eab075fb7-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-91c0951621\" (UID: \"fab521b3cc318ee80335cf2eab075fb7\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.618338 kubelet[2181]: I0209 07:04:18.618102 2181 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8f2dae335dfad7c75918e1b204ca0074-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-91c0951621\" (UID: \"8f2dae335dfad7c75918e1b204ca0074\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.618338 kubelet[2181]: I0209 07:04:18.618154 2181 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8f2dae335dfad7c75918e1b204ca0074-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-91c0951621\" (UID: \"8f2dae335dfad7c75918e1b204ca0074\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.618838 kubelet[2181]: I0209 07:04:18.618209 2181 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/be846ac9e98188b335f0030d443f7572-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-91c0951621\" (UID: \"be846ac9e98188b335f0030d443f7572\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.624236 kubelet[2181]: I0209 07:04:18.624228 2181 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.624413 kubelet[2181]: E0209 07:04:18.624406 2181 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.90.101:6443/api/v1/nodes\": dial tcp 139.178.90.101:6443: connect: connection refused" node="ci-3510.3.2-a-91c0951621" Feb 9 07:04:18.775155 env[1474]: time="2024-02-09T07:04:18.775014172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-91c0951621,Uid:8f2dae335dfad7c75918e1b204ca0074,Namespace:kube-system,Attempt:0,}" Feb 9 07:04:18.784386 env[1474]: time="2024-02-09T07:04:18.784271835Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-91c0951621,Uid:be846ac9e98188b335f0030d443f7572,Namespace:kube-system,Attempt:0,}" Feb 9 07:04:18.793457 env[1474]: time="2024-02-09T07:04:18.793382063Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-91c0951621,Uid:fab521b3cc318ee80335cf2eab075fb7,Namespace:kube-system,Attempt:0,}" Feb 9 07:04:18.919688 kubelet[2181]: E0209 07:04:18.919490 2181 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.90.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-91c0951621?timeout=10s\": dial tcp 139.178.90.101:6443: connect: connection refused" interval="800ms" Feb 9 07:04:19.028361 kubelet[2181]: I0209 07:04:19.028275 2181 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-91c0951621" Feb 9 07:04:19.029029 kubelet[2181]: E0209 07:04:19.028959 2181 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.90.101:6443/api/v1/nodes\": dial tcp 139.178.90.101:6443: connect: connection refused" node="ci-3510.3.2-a-91c0951621" Feb 9 07:04:19.256928 kubelet[2181]: W0209 07:04:19.256857 2181 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.90.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.90.101:6443: connect: connection refused Feb 9 07:04:19.256928 kubelet[2181]: E0209 07:04:19.256878 2181 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.90.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.90.101:6443: connect: connection refused Feb 9 07:04:19.259602 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount268492466.mount: Deactivated successfully. Feb 9 07:04:19.260500 env[1474]: time="2024-02-09T07:04:19.260474477Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:19.261964 env[1474]: time="2024-02-09T07:04:19.261950617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:19.262476 env[1474]: time="2024-02-09T07:04:19.262463710Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:19.263055 env[1474]: time="2024-02-09T07:04:19.263046551Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:19.263407 env[1474]: time="2024-02-09T07:04:19.263397396Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:19.264747 env[1474]: time="2024-02-09T07:04:19.264735626Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:19.266300 env[1474]: time="2024-02-09T07:04:19.266291032Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:19.268050 env[1474]: time="2024-02-09T07:04:19.268040068Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:19.268432 env[1474]: time="2024-02-09T07:04:19.268422103Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:19.268821 env[1474]: time="2024-02-09T07:04:19.268812200Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:19.269218 env[1474]: time="2024-02-09T07:04:19.269209718Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:19.269654 env[1474]: time="2024-02-09T07:04:19.269643198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:19.274647 env[1474]: time="2024-02-09T07:04:19.274608662Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 07:04:19.274647 env[1474]: time="2024-02-09T07:04:19.274633382Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 07:04:19.274647 env[1474]: time="2024-02-09T07:04:19.274640924Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 07:04:19.274775 env[1474]: time="2024-02-09T07:04:19.274708508Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/45f46ef3446fda67a255f053911944fe01e272eac8d92b5adb2e2023ab840ecd pid=2236 runtime=io.containerd.runc.v2 Feb 9 07:04:19.275388 env[1474]: time="2024-02-09T07:04:19.275361534Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 07:04:19.275446 env[1474]: time="2024-02-09T07:04:19.275381120Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 07:04:19.275446 env[1474]: time="2024-02-09T07:04:19.275390114Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 07:04:19.275490 env[1474]: time="2024-02-09T07:04:19.275452643Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/121d7deaedd56fb820f9b2a6aeaa979728cb3cc5b07c6de792c59733dd1e4c7b pid=2244 runtime=io.containerd.runc.v2 Feb 9 07:04:19.276256 env[1474]: time="2024-02-09T07:04:19.276230630Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 07:04:19.276256 env[1474]: time="2024-02-09T07:04:19.276248852Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 07:04:19.276313 env[1474]: time="2024-02-09T07:04:19.276255935Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 07:04:19.276371 env[1474]: time="2024-02-09T07:04:19.276352068Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8bd0f6c51a34e08db950f7315ee889bf904653c41ec1ffe5f8662e38688ea4a7 pid=2261 runtime=io.containerd.runc.v2 Feb 9 07:04:19.282384 systemd[1]: Started cri-containerd-121d7deaedd56fb820f9b2a6aeaa979728cb3cc5b07c6de792c59733dd1e4c7b.scope. Feb 9 07:04:19.283108 systemd[1]: Started cri-containerd-8bd0f6c51a34e08db950f7315ee889bf904653c41ec1ffe5f8662e38688ea4a7.scope. Feb 9 07:04:19.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit: BPF prog-id=61 op=LOAD Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2261 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643066366335316133346530386462393530663733313565653838 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2261 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643066366335316133346530386462393530663733313565653838 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit: BPF prog-id=62 op=LOAD Feb 9 07:04:19.287000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000292350 items=0 ppid=2261 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643066366335316133346530386462393530663733313565653838 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit: BPF prog-id=63 op=LOAD Feb 9 07:04:19.287000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000292398 items=0 ppid=2261 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643066366335316133346530386462393530663733313565653838 Feb 9 07:04:19.287000 audit: BPF prog-id=63 op=UNLOAD Feb 9 07:04:19.287000 audit: BPF prog-id=62 op=UNLOAD Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit: BPF prog-id=64 op=LOAD Feb 9 07:04:19.287000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002927a8 items=0 ppid=2261 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643066366335316133346530386462393530663733313565653838 Feb 9 07:04:19.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit: BPF prog-id=65 op=LOAD Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2244 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132316437646561656464353666623832306639623261366165616139 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2244 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132316437646561656464353666623832306639623261366165616139 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit: BPF prog-id=66 op=LOAD Feb 9 07:04:19.287000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024ac0 items=0 ppid=2244 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132316437646561656464353666623832306639623261366165616139 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.287000 audit: BPF prog-id=67 op=LOAD Feb 9 07:04:19.287000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024b08 items=0 ppid=2244 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132316437646561656464353666623832306639623261366165616139 Feb 9 07:04:19.288000 audit: BPF prog-id=67 op=UNLOAD Feb 9 07:04:19.288000 audit: BPF prog-id=66 op=UNLOAD Feb 9 07:04:19.288000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.288000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.288000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.288000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.288000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.288000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.288000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.288000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.288000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.288000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.288000 audit: BPF prog-id=68 op=LOAD Feb 9 07:04:19.288000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024f18 items=0 ppid=2244 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132316437646561656464353666623832306639623261366165616139 Feb 9 07:04:19.293721 systemd[1]: Started cri-containerd-45f46ef3446fda67a255f053911944fe01e272eac8d92b5adb2e2023ab840ecd.scope. Feb 9 07:04:19.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit: BPF prog-id=69 op=LOAD Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2236 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663436656633343436666461363761323535663035333931313934 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2236 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663436656633343436666461363761323535663035333931313934 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit: BPF prog-id=70 op=LOAD Feb 9 07:04:19.299000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003089a0 items=0 ppid=2236 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663436656633343436666461363761323535663035333931313934 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit: BPF prog-id=71 op=LOAD Feb 9 07:04:19.299000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003089e8 items=0 ppid=2236 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663436656633343436666461363761323535663035333931313934 Feb 9 07:04:19.299000 audit: BPF prog-id=71 op=UNLOAD Feb 9 07:04:19.299000 audit: BPF prog-id=70 op=UNLOAD Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.299000 audit: BPF prog-id=72 op=LOAD Feb 9 07:04:19.299000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000308df8 items=0 ppid=2236 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663436656633343436666461363761323535663035333931313934 Feb 9 07:04:19.305580 env[1474]: time="2024-02-09T07:04:19.305553580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-91c0951621,Uid:8f2dae335dfad7c75918e1b204ca0074,Namespace:kube-system,Attempt:0,} returns sandbox id \"121d7deaedd56fb820f9b2a6aeaa979728cb3cc5b07c6de792c59733dd1e4c7b\"" Feb 9 07:04:19.307250 env[1474]: time="2024-02-09T07:04:19.307234824Z" level=info msg="CreateContainer within sandbox \"121d7deaedd56fb820f9b2a6aeaa979728cb3cc5b07c6de792c59733dd1e4c7b\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 07:04:19.311695 env[1474]: time="2024-02-09T07:04:19.311681756Z" level=info msg="CreateContainer within sandbox \"121d7deaedd56fb820f9b2a6aeaa979728cb3cc5b07c6de792c59733dd1e4c7b\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"1abaecafc252a018a811946ee1621248f6ec543c7cbf2a65bb59dfaaf0b0abd4\"" Feb 9 07:04:19.311926 env[1474]: time="2024-02-09T07:04:19.311912662Z" level=info msg="StartContainer for \"1abaecafc252a018a811946ee1621248f6ec543c7cbf2a65bb59dfaaf0b0abd4\"" Feb 9 07:04:19.317802 env[1474]: time="2024-02-09T07:04:19.317768638Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-91c0951621,Uid:fab521b3cc318ee80335cf2eab075fb7,Namespace:kube-system,Attempt:0,} returns sandbox id \"8bd0f6c51a34e08db950f7315ee889bf904653c41ec1ffe5f8662e38688ea4a7\"" Feb 9 07:04:19.318980 env[1474]: time="2024-02-09T07:04:19.318960934Z" level=info msg="CreateContainer within sandbox \"8bd0f6c51a34e08db950f7315ee889bf904653c41ec1ffe5f8662e38688ea4a7\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 07:04:19.319242 systemd[1]: Started cri-containerd-1abaecafc252a018a811946ee1621248f6ec543c7cbf2a65bb59dfaaf0b0abd4.scope. Feb 9 07:04:19.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit: BPF prog-id=73 op=LOAD Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2244 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161626165636166633235326130313861383131393436656531363231 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2244 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161626165636166633235326130313861383131393436656531363231 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit: BPF prog-id=74 op=LOAD Feb 9 07:04:19.325000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002148e0 items=0 ppid=2244 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161626165636166633235326130313861383131393436656531363231 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit: BPF prog-id=75 op=LOAD Feb 9 07:04:19.325000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000214928 items=0 ppid=2244 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161626165636166633235326130313861383131393436656531363231 Feb 9 07:04:19.325000 audit: BPF prog-id=75 op=UNLOAD Feb 9 07:04:19.325000 audit: BPF prog-id=74 op=UNLOAD Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.325000 audit: BPF prog-id=76 op=LOAD Feb 9 07:04:19.325000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000214d38 items=0 ppid=2244 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161626165636166633235326130313861383131393436656531363231 Feb 9 07:04:19.329587 env[1474]: time="2024-02-09T07:04:19.329568686Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-91c0951621,Uid:be846ac9e98188b335f0030d443f7572,Namespace:kube-system,Attempt:0,} returns sandbox id \"45f46ef3446fda67a255f053911944fe01e272eac8d92b5adb2e2023ab840ecd\"" Feb 9 07:04:19.330640 env[1474]: time="2024-02-09T07:04:19.330624895Z" level=info msg="CreateContainer within sandbox \"45f46ef3446fda67a255f053911944fe01e272eac8d92b5adb2e2023ab840ecd\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 07:04:19.341247 env[1474]: time="2024-02-09T07:04:19.341172178Z" level=info msg="CreateContainer within sandbox \"8bd0f6c51a34e08db950f7315ee889bf904653c41ec1ffe5f8662e38688ea4a7\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d08c3e493a440deff57a25c176282033f54c56429824c5718420d04eb40d9c32\"" Feb 9 07:04:19.341510 env[1474]: time="2024-02-09T07:04:19.341489043Z" level=info msg="StartContainer for \"d08c3e493a440deff57a25c176282033f54c56429824c5718420d04eb40d9c32\"" Feb 9 07:04:19.342280 env[1474]: time="2024-02-09T07:04:19.342265096Z" level=info msg="CreateContainer within sandbox \"45f46ef3446fda67a255f053911944fe01e272eac8d92b5adb2e2023ab840ecd\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"d1a2eb7819ead18ac4e8e8cf358bb2fbb5e57e1b56236f6e7c76ee01469491c4\"" Feb 9 07:04:19.342442 env[1474]: time="2024-02-09T07:04:19.342432181Z" level=info msg="StartContainer for \"d1a2eb7819ead18ac4e8e8cf358bb2fbb5e57e1b56236f6e7c76ee01469491c4\"" Feb 9 07:04:19.349942 systemd[1]: Started cri-containerd-d1a2eb7819ead18ac4e8e8cf358bb2fbb5e57e1b56236f6e7c76ee01469491c4.scope. Feb 9 07:04:19.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit: BPF prog-id=77 op=LOAD Feb 9 07:04:19.356856 env[1474]: time="2024-02-09T07:04:19.356753989Z" level=info msg="StartContainer for \"1abaecafc252a018a811946ee1621248f6ec543c7cbf2a65bb59dfaaf0b0abd4\" returns successfully" Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2236 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613265623738313965616431386163346538653863663335386262 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2236 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613265623738313965616431386163346538653863663335386262 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit: BPF prog-id=78 op=LOAD Feb 9 07:04:19.356000 audit[2388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001cba30 items=0 ppid=2236 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613265623738313965616431386163346538653863663335386262 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit: BPF prog-id=79 op=LOAD Feb 9 07:04:19.356000 audit[2388]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001cba78 items=0 ppid=2236 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613265623738313965616431386163346538653863663335386262 Feb 9 07:04:19.356000 audit: BPF prog-id=79 op=UNLOAD Feb 9 07:04:19.356000 audit: BPF prog-id=78 op=UNLOAD Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.356000 audit: BPF prog-id=80 op=LOAD Feb 9 07:04:19.356000 audit[2388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001cbe88 items=0 ppid=2236 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613265623738313965616431386163346538653863663335386262 Feb 9 07:04:19.361339 systemd[1]: Started cri-containerd-d08c3e493a440deff57a25c176282033f54c56429824c5718420d04eb40d9c32.scope. Feb 9 07:04:19.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.367000 audit: BPF prog-id=81 op=LOAD Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2261 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386333653439336134343064656666353761323563313736323832 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2261 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386333653439336134343064656666353761323563313736323832 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit: BPF prog-id=82 op=LOAD Feb 9 07:04:19.368000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024b90 items=0 ppid=2261 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386333653439336134343064656666353761323563313736323832 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit: BPF prog-id=83 op=LOAD Feb 9 07:04:19.368000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024bd8 items=0 ppid=2261 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386333653439336134343064656666353761323563313736323832 Feb 9 07:04:19.368000 audit: BPF prog-id=83 op=UNLOAD Feb 9 07:04:19.368000 audit: BPF prog-id=82 op=UNLOAD Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:19.368000 audit: BPF prog-id=84 op=LOAD Feb 9 07:04:19.368000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024fe8 items=0 ppid=2261 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:19.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386333653439336134343064656666353761323563313736323832 Feb 9 07:04:19.386817 env[1474]: time="2024-02-09T07:04:19.386784131Z" level=info msg="StartContainer for \"d08c3e493a440deff57a25c176282033f54c56429824c5718420d04eb40d9c32\" returns successfully" Feb 9 07:04:19.387107 env[1474]: time="2024-02-09T07:04:19.387091101Z" level=info msg="StartContainer for \"d1a2eb7819ead18ac4e8e8cf358bb2fbb5e57e1b56236f6e7c76ee01469491c4\" returns successfully" Feb 9 07:04:19.830815 kubelet[2181]: I0209 07:04:19.830798 2181 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-91c0951621" Feb 9 07:04:19.874000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:04:19.874000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:04:19.874000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001445d0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:04:19.874000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00015e960 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:04:19.874000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:04:19.874000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:04:19.930000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:04:19.930000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00424d260 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:04:19.930000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:04:19.930000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:04:19.930000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006aa2300 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:04:19.930000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:04:19.930000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:04:19.930000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006adc000 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:04:19.930000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:04:19.931000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:04:19.931000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c007016000 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:04:19.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:04:19.931000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:04:19.931000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c000fdc020 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:04:19.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:04:19.931000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:04:19.931000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c0049cc030 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:04:19.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:04:19.952966 kubelet[2181]: E0209 07:04:19.952938 2181 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-91c0951621\" not found" node="ci-3510.3.2-a-91c0951621" Feb 9 07:04:20.052771 kubelet[2181]: I0209 07:04:20.052724 2181 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-91c0951621" Feb 9 07:04:20.315603 kubelet[2181]: I0209 07:04:20.315538 2181 apiserver.go:52] "Watching apiserver" Feb 9 07:04:20.341976 kubelet[2181]: E0209 07:04:20.341896 2181 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-91c0951621\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.2-a-91c0951621" Feb 9 07:04:20.341976 kubelet[2181]: E0209 07:04:20.341952 2181 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-91c0951621\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.2-a-91c0951621" Feb 9 07:04:20.342547 kubelet[2181]: E0209 07:04:20.342477 2181 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-91c0951621\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:20.417976 kubelet[2181]: I0209 07:04:20.417878 2181 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 07:04:21.348706 kubelet[2181]: W0209 07:04:21.348656 2181 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 07:04:21.349666 kubelet[2181]: W0209 07:04:21.349356 2181 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 07:04:23.327401 systemd[1]: Reloading. Feb 9 07:04:23.401433 /usr/lib/systemd/system-generators/torcx-generator[2512]: time="2024-02-09T07:04:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 07:04:23.401455 /usr/lib/systemd/system-generators/torcx-generator[2512]: time="2024-02-09T07:04:23Z" level=info msg="torcx already run" Feb 9 07:04:23.453411 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 07:04:23.453419 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 07:04:23.465506 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 07:04:23.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.545545 kernel: kauditd_printk_skb: 579 callbacks suppressed Feb 9 07:04:23.545584 kernel: audit: type=1400 audit(1707462263.518:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.672725 kernel: audit: type=1400 audit(1707462263.518:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.672784 kernel: audit: type=1400 audit(1707462263.518:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.736459 kernel: audit: type=1400 audit(1707462263.518:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.801728 kernel: audit: type=1400 audit(1707462263.518:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.866960 kernel: audit: type=1400 audit(1707462263.518:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.931694 kernel: audit: type=1400 audit(1707462263.518:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.058938 kernel: audit: type=1400 audit(1707462263.518:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.058996 kernel: audit: type=1400 audit(1707462263.518:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187313 kernel: audit: type=1400 audit(1707462263.608:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.608000 audit: BPF prog-id=85 op=LOAD Feb 9 07:04:23.608000 audit: BPF prog-id=46 op=UNLOAD Feb 9 07:04:23.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.735000 audit: BPF prog-id=86 op=LOAD Feb 9 07:04:23.735000 audit: BPF prog-id=73 op=UNLOAD Feb 9 07:04:23.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.866000 audit: BPF prog-id=87 op=LOAD Feb 9 07:04:23.866000 audit: BPF prog-id=47 op=UNLOAD Feb 9 07:04:23.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.994000 audit: BPF prog-id=88 op=LOAD Feb 9 07:04:23.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:23.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.021000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:04:24.021000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001636be0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:04:24.021000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:04:24.022000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:04:24.022000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bc0260 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:04:24.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:04:24.022000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:04:24.022000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ccc3a0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:04:24.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:04:24.023000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:04:24.023000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e0cf20 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:04:24.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:04:24.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.122000 audit: BPF prog-id=89 op=LOAD Feb 9 07:04:24.122000 audit: BPF prog-id=48 op=UNLOAD Feb 9 07:04:24.122000 audit: BPF prog-id=49 op=UNLOAD Feb 9 07:04:24.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit: BPF prog-id=90 op=LOAD Feb 9 07:04:24.186000 audit: BPF prog-id=50 op=UNLOAD Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit: BPF prog-id=91 op=LOAD Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit: BPF prog-id=92 op=LOAD Feb 9 07:04:24.187000 audit: BPF prog-id=51 op=UNLOAD Feb 9 07:04:24.187000 audit: BPF prog-id=52 op=UNLOAD Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit: BPF prog-id=93 op=LOAD Feb 9 07:04:24.187000 audit: BPF prog-id=81 op=UNLOAD Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.187000 audit: BPF prog-id=94 op=LOAD Feb 9 07:04:24.188000 audit: BPF prog-id=53 op=UNLOAD Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit: BPF prog-id=95 op=LOAD Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit: BPF prog-id=96 op=LOAD Feb 9 07:04:24.188000 audit: BPF prog-id=54 op=UNLOAD Feb 9 07:04:24.188000 audit: BPF prog-id=55 op=UNLOAD Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.188000 audit: BPF prog-id=97 op=LOAD Feb 9 07:04:24.188000 audit: BPF prog-id=56 op=UNLOAD Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit: BPF prog-id=98 op=LOAD Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit: BPF prog-id=99 op=LOAD Feb 9 07:04:24.189000 audit: BPF prog-id=57 op=UNLOAD Feb 9 07:04:24.189000 audit: BPF prog-id=58 op=UNLOAD Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.189000 audit: BPF prog-id=100 op=LOAD Feb 9 07:04:24.189000 audit: BPF prog-id=61 op=UNLOAD Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit: BPF prog-id=101 op=LOAD Feb 9 07:04:24.190000 audit: BPF prog-id=77 op=UNLOAD Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit: BPF prog-id=102 op=LOAD Feb 9 07:04:24.191000 audit: BPF prog-id=69 op=UNLOAD Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit: BPF prog-id=103 op=LOAD Feb 9 07:04:24.191000 audit: BPF prog-id=59 op=UNLOAD Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.192000 audit: BPF prog-id=104 op=LOAD Feb 9 07:04:24.192000 audit: BPF prog-id=60 op=UNLOAD Feb 9 07:04:24.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.192000 audit: BPF prog-id=105 op=LOAD Feb 9 07:04:24.192000 audit: BPF prog-id=65 op=UNLOAD Feb 9 07:04:24.198428 systemd[1]: Stopping kubelet.service... Feb 9 07:04:24.198510 kubelet[2181]: I0209 07:04:24.198430 2181 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 07:04:24.220777 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 07:04:24.220885 systemd[1]: Stopped kubelet.service. Feb 9 07:04:24.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:24.221831 systemd[1]: Started kubelet.service. Feb 9 07:04:24.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:24.247865 kubelet[2572]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 07:04:24.247865 kubelet[2572]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 07:04:24.247865 kubelet[2572]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 07:04:24.248176 kubelet[2572]: I0209 07:04:24.247894 2572 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 07:04:24.250761 kubelet[2572]: I0209 07:04:24.250618 2572 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 07:04:24.250761 kubelet[2572]: I0209 07:04:24.250639 2572 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 07:04:24.251076 kubelet[2572]: I0209 07:04:24.251038 2572 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 07:04:24.251954 kubelet[2572]: I0209 07:04:24.251919 2572 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 07:04:24.252496 kubelet[2572]: I0209 07:04:24.252455 2572 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 07:04:24.271681 kubelet[2572]: I0209 07:04:24.271664 2572 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 07:04:24.271784 kubelet[2572]: I0209 07:04:24.271778 2572 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 07:04:24.271889 kubelet[2572]: I0209 07:04:24.271883 2572 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 07:04:24.271941 kubelet[2572]: I0209 07:04:24.271903 2572 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 07:04:24.271941 kubelet[2572]: I0209 07:04:24.271909 2572 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 07:04:24.271941 kubelet[2572]: I0209 07:04:24.271927 2572 state_mem.go:36] "Initialized new in-memory state store" Feb 9 07:04:24.272007 kubelet[2572]: I0209 07:04:24.271971 2572 kubelet.go:393] "Attempting to sync node with API server" Feb 9 07:04:24.272007 kubelet[2572]: I0209 07:04:24.271980 2572 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 07:04:24.272007 kubelet[2572]: I0209 07:04:24.271993 2572 kubelet.go:309] "Adding apiserver pod source" Feb 9 07:04:24.272007 kubelet[2572]: I0209 07:04:24.272000 2572 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 07:04:24.272389 kubelet[2572]: I0209 07:04:24.272376 2572 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 07:04:24.272696 kubelet[2572]: I0209 07:04:24.272688 2572 server.go:1232] "Started kubelet" Feb 9 07:04:24.272750 kubelet[2572]: I0209 07:04:24.272739 2572 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 07:04:24.272924 kubelet[2572]: I0209 07:04:24.272912 2572 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 07:04:24.272993 kubelet[2572]: E0209 07:04:24.272980 2572 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 07:04:24.273033 kubelet[2572]: E0209 07:04:24.273001 2572 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 07:04:24.273033 kubelet[2572]: I0209 07:04:24.273012 2572 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 07:04:24.273000 audit[2572]: AVC avc: denied { mac_admin } for pid=2572 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.273000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 07:04:24.273000 audit[2572]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00118cdb0 a1=c00118e5d0 a2=c00118cd80 a3=25 items=0 ppid=1 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:24.273000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 07:04:24.273960 kubelet[2572]: I0209 07:04:24.273953 2572 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 07:04:24.273000 audit[2572]: AVC avc: denied { mac_admin } for pid=2572 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.273000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 07:04:24.273000 audit[2572]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011ac2a0 a1=c00118e5e8 a2=c00118ce40 a3=25 items=0 ppid=1 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:24.273000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 07:04:24.274073 kubelet[2572]: I0209 07:04:24.273985 2572 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 07:04:24.274139 kubelet[2572]: I0209 07:04:24.274129 2572 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 07:04:24.274170 kubelet[2572]: I0209 07:04:24.274159 2572 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 07:04:24.274230 kubelet[2572]: I0209 07:04:24.274219 2572 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 07:04:24.274272 kubelet[2572]: E0209 07:04:24.274230 2572 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-91c0951621\" not found" Feb 9 07:04:24.274341 kubelet[2572]: I0209 07:04:24.274330 2572 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 07:04:24.274379 kubelet[2572]: I0209 07:04:24.274361 2572 server.go:462] "Adding debug handlers to kubelet server" Feb 9 07:04:24.278886 kubelet[2572]: I0209 07:04:24.278867 2572 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 07:04:24.279535 kubelet[2572]: I0209 07:04:24.279522 2572 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 07:04:24.279622 kubelet[2572]: I0209 07:04:24.279612 2572 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 07:04:24.279714 kubelet[2572]: I0209 07:04:24.279705 2572 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 07:04:24.279809 kubelet[2572]: E0209 07:04:24.279798 2572 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 07:04:24.294256 kubelet[2572]: I0209 07:04:24.294240 2572 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 07:04:24.294256 kubelet[2572]: I0209 07:04:24.294251 2572 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 07:04:24.294256 kubelet[2572]: I0209 07:04:24.294260 2572 state_mem.go:36] "Initialized new in-memory state store" Feb 9 07:04:24.294428 kubelet[2572]: I0209 07:04:24.294352 2572 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 07:04:24.294428 kubelet[2572]: I0209 07:04:24.294365 2572 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 9 07:04:24.294428 kubelet[2572]: I0209 07:04:24.294368 2572 policy_none.go:49] "None policy: Start" Feb 9 07:04:24.294630 kubelet[2572]: I0209 07:04:24.294622 2572 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 07:04:24.294664 kubelet[2572]: I0209 07:04:24.294633 2572 state_mem.go:35] "Initializing new in-memory state store" Feb 9 07:04:24.294712 kubelet[2572]: I0209 07:04:24.294706 2572 state_mem.go:75] "Updated machine memory state" Feb 9 07:04:24.296520 kubelet[2572]: I0209 07:04:24.296508 2572 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 07:04:24.296000 audit[2572]: AVC avc: denied { mac_admin } for pid=2572 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:24.296000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 07:04:24.296000 audit[2572]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00103c570 a1=c001236f30 a2=c00103c540 a3=25 items=0 ppid=1 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:24.296000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 07:04:24.296745 kubelet[2572]: I0209 07:04:24.296543 2572 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 07:04:24.296745 kubelet[2572]: I0209 07:04:24.296658 2572 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 07:04:24.376895 kubelet[2572]: I0209 07:04:24.376852 2572 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.380237 kubelet[2572]: I0209 07:04:24.380199 2572 topology_manager.go:215] "Topology Admit Handler" podUID="8f2dae335dfad7c75918e1b204ca0074" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.380274 kubelet[2572]: I0209 07:04:24.380258 2572 topology_manager.go:215] "Topology Admit Handler" podUID="be846ac9e98188b335f0030d443f7572" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.380305 kubelet[2572]: I0209 07:04:24.380279 2572 topology_manager.go:215] "Topology Admit Handler" podUID="fab521b3cc318ee80335cf2eab075fb7" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.383388 kubelet[2572]: I0209 07:04:24.383350 2572 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.383427 kubelet[2572]: I0209 07:04:24.383392 2572 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.383567 kubelet[2572]: W0209 07:04:24.383536 2572 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 07:04:24.384200 kubelet[2572]: W0209 07:04:24.384190 2572 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 07:04:24.384243 kubelet[2572]: E0209 07:04:24.384221 2572 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-91c0951621\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.384243 kubelet[2572]: W0209 07:04:24.384241 2572 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 07:04:24.384292 kubelet[2572]: E0209 07:04:24.384264 2572 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-91c0951621\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.475584 kubelet[2572]: I0209 07:04:24.475444 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/be846ac9e98188b335f0030d443f7572-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-91c0951621\" (UID: \"be846ac9e98188b335f0030d443f7572\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.475584 kubelet[2572]: I0209 07:04:24.475471 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/be846ac9e98188b335f0030d443f7572-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-91c0951621\" (UID: \"be846ac9e98188b335f0030d443f7572\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.475584 kubelet[2572]: I0209 07:04:24.475485 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fab521b3cc318ee80335cf2eab075fb7-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-91c0951621\" (UID: \"fab521b3cc318ee80335cf2eab075fb7\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.475584 kubelet[2572]: I0209 07:04:24.475515 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8f2dae335dfad7c75918e1b204ca0074-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-91c0951621\" (UID: \"8f2dae335dfad7c75918e1b204ca0074\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.475584 kubelet[2572]: I0209 07:04:24.475558 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/be846ac9e98188b335f0030d443f7572-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-91c0951621\" (UID: \"be846ac9e98188b335f0030d443f7572\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.475736 kubelet[2572]: I0209 07:04:24.475591 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/be846ac9e98188b335f0030d443f7572-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-91c0951621\" (UID: \"be846ac9e98188b335f0030d443f7572\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.475736 kubelet[2572]: I0209 07:04:24.475605 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/be846ac9e98188b335f0030d443f7572-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-91c0951621\" (UID: \"be846ac9e98188b335f0030d443f7572\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.475736 kubelet[2572]: I0209 07:04:24.475615 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8f2dae335dfad7c75918e1b204ca0074-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-91c0951621\" (UID: \"8f2dae335dfad7c75918e1b204ca0074\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-91c0951621" Feb 9 07:04:24.475736 kubelet[2572]: I0209 07:04:24.475641 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8f2dae335dfad7c75918e1b204ca0074-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-91c0951621\" (UID: \"8f2dae335dfad7c75918e1b204ca0074\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-91c0951621" Feb 9 07:04:25.272846 kubelet[2572]: I0209 07:04:25.272773 2572 apiserver.go:52] "Watching apiserver" Feb 9 07:04:25.294270 kubelet[2572]: W0209 07:04:25.294258 2572 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 07:04:25.294341 kubelet[2572]: E0209 07:04:25.294294 2572 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-91c0951621\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-91c0951621" Feb 9 07:04:25.295179 kubelet[2572]: W0209 07:04:25.295170 2572 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 07:04:25.295257 kubelet[2572]: W0209 07:04:25.295184 2572 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 07:04:25.295257 kubelet[2572]: E0209 07:04:25.295222 2572 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-91c0951621\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-91c0951621" Feb 9 07:04:25.295257 kubelet[2572]: E0209 07:04:25.295252 2572 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-91c0951621\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-91c0951621" Feb 9 07:04:25.306769 kubelet[2572]: I0209 07:04:25.306726 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-91c0951621" podStartSLOduration=4.306700269 podCreationTimestamp="2024-02-09 07:04:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 07:04:25.306595922 +0000 UTC m=+1.083046493" watchObservedRunningTime="2024-02-09 07:04:25.306700269 +0000 UTC m=+1.083150836" Feb 9 07:04:25.311118 kubelet[2572]: I0209 07:04:25.311106 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-91c0951621" podStartSLOduration=4.311088833 podCreationTimestamp="2024-02-09 07:04:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 07:04:25.310974536 +0000 UTC m=+1.087425107" watchObservedRunningTime="2024-02-09 07:04:25.311088833 +0000 UTC m=+1.087539405" Feb 9 07:04:25.315086 kubelet[2572]: I0209 07:04:25.315076 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-91c0951621" podStartSLOduration=1.315052926 podCreationTimestamp="2024-02-09 07:04:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 07:04:25.314991669 +0000 UTC m=+1.091442240" watchObservedRunningTime="2024-02-09 07:04:25.315052926 +0000 UTC m=+1.091503500" Feb 9 07:04:25.375459 kubelet[2572]: I0209 07:04:25.375403 2572 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 07:04:30.470696 sudo[1629]: pam_unix(sudo:session): session closed for user root Feb 9 07:04:30.469000 audit[1629]: USER_END pid=1629 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 07:04:30.471671 sshd[1626]: pam_unix(sshd:session): session closed for user core Feb 9 07:04:30.473094 systemd[1]: sshd@6-139.178.90.101:22-147.75.109.163:35248.service: Deactivated successfully. Feb 9 07:04:30.473543 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 07:04:30.473631 systemd[1]: session-9.scope: Consumed 3.012s CPU time. Feb 9 07:04:30.473977 systemd-logind[1462]: Session 9 logged out. Waiting for processes to exit. Feb 9 07:04:30.474478 systemd-logind[1462]: Removed session 9. Feb 9 07:04:30.497859 kernel: kauditd_printk_skb: 276 callbacks suppressed Feb 9 07:04:30.497902 kernel: audit: type=1106 audit(1707462270.469:930): pid=1629 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 07:04:30.469000 audit[1629]: CRED_DISP pid=1629 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 07:04:30.675981 kernel: audit: type=1104 audit(1707462270.469:931): pid=1629 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 07:04:30.676005 kernel: audit: type=1106 audit(1707462270.470:932): pid=1626 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:04:30.470000 audit[1626]: USER_END pid=1626 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:04:30.772221 kernel: audit: type=1104 audit(1707462270.470:933): pid=1626 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:04:30.470000 audit[1626]: CRED_DISP pid=1626 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:04:30.862238 kernel: audit: type=1131 audit(1707462270.471:934): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.101:22-147.75.109.163:35248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:30.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.101:22-147.75.109.163:35248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:32.983700 update_engine[1464]: I0209 07:04:32.983618 1464 update_attempter.cc:509] Updating boot flags... Feb 9 07:04:34.839000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sdb9" ino=524902 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 07:04:34.839000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e60340 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:04:34.934546 kernel: audit: type=1400 audit(1707462274.839:935): avc: denied { watch } for pid=2403 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sdb9" ino=524902 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 07:04:34.934581 kernel: audit: type=1300 audit(1707462274.839:935): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e60340 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:04:34.839000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:04:35.151928 kernel: audit: type=1327 audit(1707462274.839:935): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:04:36.830107 kubelet[2572]: I0209 07:04:36.830052 2572 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 07:04:36.831148 env[1474]: time="2024-02-09T07:04:36.830826463Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 07:04:36.831918 kubelet[2572]: I0209 07:04:36.831247 2572 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 07:04:37.547048 kubelet[2572]: I0209 07:04:37.546980 2572 topology_manager.go:215] "Topology Admit Handler" podUID="0d16ba2f-e967-468d-be8c-ae006634bcf7" podNamespace="kube-system" podName="kube-proxy-kflpt" Feb 9 07:04:37.550312 kubelet[2572]: I0209 07:04:37.550253 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0d16ba2f-e967-468d-be8c-ae006634bcf7-xtables-lock\") pod \"kube-proxy-kflpt\" (UID: \"0d16ba2f-e967-468d-be8c-ae006634bcf7\") " pod="kube-system/kube-proxy-kflpt" Feb 9 07:04:37.550639 kubelet[2572]: I0209 07:04:37.550387 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0d16ba2f-e967-468d-be8c-ae006634bcf7-lib-modules\") pod \"kube-proxy-kflpt\" (UID: \"0d16ba2f-e967-468d-be8c-ae006634bcf7\") " pod="kube-system/kube-proxy-kflpt" Feb 9 07:04:37.550639 kubelet[2572]: I0209 07:04:37.550539 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0d16ba2f-e967-468d-be8c-ae006634bcf7-kube-proxy\") pod \"kube-proxy-kflpt\" (UID: \"0d16ba2f-e967-468d-be8c-ae006634bcf7\") " pod="kube-system/kube-proxy-kflpt" Feb 9 07:04:37.551020 kubelet[2572]: I0209 07:04:37.550702 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pwjkc\" (UniqueName: \"kubernetes.io/projected/0d16ba2f-e967-468d-be8c-ae006634bcf7-kube-api-access-pwjkc\") pod \"kube-proxy-kflpt\" (UID: \"0d16ba2f-e967-468d-be8c-ae006634bcf7\") " pod="kube-system/kube-proxy-kflpt" Feb 9 07:04:37.561350 systemd[1]: Created slice kubepods-besteffort-pod0d16ba2f_e967_468d_be8c_ae006634bcf7.slice. Feb 9 07:04:37.881545 env[1474]: time="2024-02-09T07:04:37.881332952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kflpt,Uid:0d16ba2f-e967-468d-be8c-ae006634bcf7,Namespace:kube-system,Attempt:0,}" Feb 9 07:04:37.903000 env[1474]: time="2024-02-09T07:04:37.902829545Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 07:04:37.903000 env[1474]: time="2024-02-09T07:04:37.902919285Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 07:04:37.903000 env[1474]: time="2024-02-09T07:04:37.902954566Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 07:04:37.903434 env[1474]: time="2024-02-09T07:04:37.903249408Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6139d88ef583f16eb8bc79461b712a421b5e9f40f2aa23ea6a01e5e2095f9f1d pid=2754 runtime=io.containerd.runc.v2 Feb 9 07:04:37.951523 systemd[1]: Started cri-containerd-6139d88ef583f16eb8bc79461b712a421b5e9f40f2aa23ea6a01e5e2095f9f1d.scope. Feb 9 07:04:37.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:37.965409 kubelet[2572]: I0209 07:04:37.965381 2572 topology_manager.go:215] "Topology Admit Handler" podUID="dc657255-3bf8-44d3-8091-631a7be0e29d" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-8lt8c" Feb 9 07:04:37.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.054881 kubelet[2572]: I0209 07:04:38.054869 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dc657255-3bf8-44d3-8091-631a7be0e29d-var-lib-calico\") pod \"tigera-operator-55585899bf-8lt8c\" (UID: \"dc657255-3bf8-44d3-8091-631a7be0e29d\") " pod="tigera-operator/tigera-operator-55585899bf-8lt8c" Feb 9 07:04:38.054948 kubelet[2572]: I0209 07:04:38.054897 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7stnk\" (UniqueName: \"kubernetes.io/projected/dc657255-3bf8-44d3-8091-631a7be0e29d-kube-api-access-7stnk\") pod \"tigera-operator-55585899bf-8lt8c\" (UID: \"dc657255-3bf8-44d3-8091-631a7be0e29d\") " pod="tigera-operator/tigera-operator-55585899bf-8lt8c" Feb 9 07:04:38.091131 kernel: audit: type=1400 audit(1707462277.961:936): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.091168 kernel: audit: type=1400 audit(1707462277.961:937): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.091186 kernel: audit: type=1400 audit(1707462277.961:938): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:37.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:37.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.157477 systemd[1]: Created slice kubepods-besteffort-poddc657255_3bf8_44d3_8091_631a7be0e29d.slice. Feb 9 07:04:38.219466 kernel: audit: type=1400 audit(1707462277.961:939): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.219537 kernel: audit: type=1400 audit(1707462277.961:940): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:37.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:37.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.348141 kernel: audit: type=1400 audit(1707462277.961:941): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.348181 kernel: audit: type=1400 audit(1707462277.961:942): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:37.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.412491 kernel: audit: type=1400 audit(1707462277.961:943): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.412530 kernel: audit: type=1400 audit(1707462277.961:944): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.412551 kernel: audit: type=1400 audit(1707462278.153:945): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:37.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:37.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.459187 env[1474]: time="2024-02-09T07:04:38.459157543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-8lt8c,Uid:dc657255-3bf8-44d3-8091-631a7be0e29d,Namespace:tigera-operator,Attempt:0,}" Feb 9 07:04:38.153000 audit: BPF prog-id=106 op=LOAD Feb 9 07:04:38.153000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.153000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2754 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631333964383865663538336631366562386263373934363162373132 Feb 9 07:04:38.153000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.153000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=2754 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631333964383865663538336631366562386263373934363162373132 Feb 9 07:04:38.153000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.153000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.153000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.153000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.153000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.153000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.153000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.153000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.153000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.153000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.153000 audit: BPF prog-id=107 op=LOAD Feb 9 07:04:38.153000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0003baa10 items=0 ppid=2754 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631333964383865663538336631366562386263373934363162373132 Feb 9 07:04:38.282000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.282000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.282000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.282000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.282000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.282000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.282000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.282000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.282000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.282000 audit: BPF prog-id=108 op=LOAD Feb 9 07:04:38.282000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0003baa58 items=0 ppid=2754 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631333964383865663538336631366562386263373934363162373132 Feb 9 07:04:38.410000 audit: BPF prog-id=108 op=UNLOAD Feb 9 07:04:38.411000 audit: BPF prog-id=107 op=UNLOAD Feb 9 07:04:38.411000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.411000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.411000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.411000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.411000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.411000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.411000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.411000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.411000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.411000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.411000 audit: BPF prog-id=109 op=LOAD Feb 9 07:04:38.411000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0003bae68 items=0 ppid=2754 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631333964383865663538336631366562386263373934363162373132 Feb 9 07:04:38.622579 env[1474]: time="2024-02-09T07:04:38.622527000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kflpt,Uid:0d16ba2f-e967-468d-be8c-ae006634bcf7,Namespace:kube-system,Attempt:0,} returns sandbox id \"6139d88ef583f16eb8bc79461b712a421b5e9f40f2aa23ea6a01e5e2095f9f1d\"" Feb 9 07:04:38.623791 env[1474]: time="2024-02-09T07:04:38.623775363Z" level=info msg="CreateContainer within sandbox \"6139d88ef583f16eb8bc79461b712a421b5e9f40f2aa23ea6a01e5e2095f9f1d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 07:04:38.627396 systemd[1]: Started sshd@7-139.178.90.101:22-144.91.92.112:43454.service. Feb 9 07:04:38.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.101:22-144.91.92.112:43454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:38.854306 env[1474]: time="2024-02-09T07:04:38.854135852Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 07:04:38.854306 env[1474]: time="2024-02-09T07:04:38.854227801Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 07:04:38.854306 env[1474]: time="2024-02-09T07:04:38.854273351Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 07:04:38.854836 env[1474]: time="2024-02-09T07:04:38.854565940Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8dbd287776abd99360313391ea065737112f18c7efdc1045b2a835b0a5ecd12c pid=2799 runtime=io.containerd.runc.v2 Feb 9 07:04:38.891900 systemd[1]: Started cri-containerd-8dbd287776abd99360313391ea065737112f18c7efdc1045b2a835b0a5ecd12c.scope. Feb 9 07:04:38.915353 env[1474]: time="2024-02-09T07:04:38.915242283Z" level=info msg="CreateContainer within sandbox \"6139d88ef583f16eb8bc79461b712a421b5e9f40f2aa23ea6a01e5e2095f9f1d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3e3c4474678248df22cd0fa76a96473ce11ad547e78d71b812656fc78f4e773b\"" Feb 9 07:04:38.916404 env[1474]: time="2024-02-09T07:04:38.916222940Z" level=info msg="StartContainer for \"3e3c4474678248df22cd0fa76a96473ce11ad547e78d71b812656fc78f4e773b\"" Feb 9 07:04:38.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.920000 audit: BPF prog-id=110 op=LOAD Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2799 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626432383737373661626439393336303331333339316561303635 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=2799 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626432383737373661626439393336303331333339316561303635 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit: BPF prog-id=111 op=LOAD Feb 9 07:04:38.922000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0003eab50 items=0 ppid=2799 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626432383737373661626439393336303331333339316561303635 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit: BPF prog-id=112 op=LOAD Feb 9 07:04:38.922000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0003eab98 items=0 ppid=2799 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626432383737373661626439393336303331333339316561303635 Feb 9 07:04:38.922000 audit: BPF prog-id=112 op=UNLOAD Feb 9 07:04:38.922000 audit: BPF prog-id=111 op=UNLOAD Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.922000 audit: BPF prog-id=113 op=LOAD Feb 9 07:04:38.922000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0003eafa8 items=0 ppid=2799 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626432383737373661626439393336303331333339316561303635 Feb 9 07:04:38.950812 systemd[1]: Started cri-containerd-3e3c4474678248df22cd0fa76a96473ce11ad547e78d71b812656fc78f4e773b.scope. Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2754 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365336334343734363738323438646632326364306661373661393634 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit: BPF prog-id=114 op=LOAD Feb 9 07:04:38.959000 audit[2832]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d2060 items=0 ppid=2754 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365336334343734363738323438646632326364306661373661393634 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit: BPF prog-id=115 op=LOAD Feb 9 07:04:38.959000 audit[2832]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d20a8 items=0 ppid=2754 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365336334343734363738323438646632326364306661373661393634 Feb 9 07:04:38.959000 audit: BPF prog-id=115 op=UNLOAD Feb 9 07:04:38.959000 audit: BPF prog-id=114 op=UNLOAD Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:38.959000 audit: BPF prog-id=116 op=LOAD Feb 9 07:04:38.959000 audit[2832]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d2138 items=0 ppid=2754 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365336334343734363738323438646632326364306661373661393634 Feb 9 07:04:38.968171 env[1474]: time="2024-02-09T07:04:38.968112025Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-8lt8c,Uid:dc657255-3bf8-44d3-8091-631a7be0e29d,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"8dbd287776abd99360313391ea065737112f18c7efdc1045b2a835b0a5ecd12c\"" Feb 9 07:04:38.969014 env[1474]: time="2024-02-09T07:04:38.968971173Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 07:04:38.997000 audit[2902]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:38.997000 audit[2902]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdde60700 a2=0 a3=7fffdde606ec items=0 ppid=2848 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 07:04:38.997000 audit[2903]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:38.997000 audit[2903]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec4092d60 a2=0 a3=7ffec4092d4c items=0 ppid=2848 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 07:04:38.997000 audit[2904]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:38.997000 audit[2904]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe09c7f7f0 a2=0 a3=7ffe09c7f7dc items=0 ppid=2848 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 07:04:38.998000 audit[2905]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:38.998000 audit[2905]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2b5e3f80 a2=0 a3=7ffc2b5e3f6c items=0 ppid=2848 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 07:04:38.998000 audit[2906]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2906 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:38.998000 audit[2906]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffddb1c8810 a2=0 a3=7ffddb1c87fc items=0 ppid=2848 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 07:04:38.998000 audit[2907]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:38.998000 audit[2907]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea7ea7810 a2=0 a3=7ffea7ea77fc items=0 ppid=2848 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:38.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 07:04:39.024058 env[1474]: time="2024-02-09T07:04:39.023967032Z" level=info msg="StartContainer for \"3e3c4474678248df22cd0fa76a96473ce11ad547e78d71b812656fc78f4e773b\" returns successfully" Feb 9 07:04:39.100000 audit[2908]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.100000 audit[2908]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdd72895e0 a2=0 a3=7ffdd72895cc items=0 ppid=2848 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 07:04:39.107000 audit[2910]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2910 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.107000 audit[2910]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdd6ff2e90 a2=0 a3=7ffdd6ff2e7c items=0 ppid=2848 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 07:04:39.118000 audit[2913]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.118000 audit[2913]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff5710f8d0 a2=0 a3=7fff5710f8bc items=0 ppid=2848 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 07:04:39.121000 audit[2914]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.121000 audit[2914]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc85871050 a2=0 a3=7ffc8587103c items=0 ppid=2848 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 07:04:39.127000 audit[2916]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.127000 audit[2916]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd86f3f560 a2=0 a3=7ffd86f3f54c items=0 ppid=2848 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 07:04:39.129000 audit[2917]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.129000 audit[2917]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe27c61ff0 a2=0 a3=7ffe27c61fdc items=0 ppid=2848 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 07:04:39.136000 audit[2919]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.136000 audit[2919]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe59e11410 a2=0 a3=7ffe59e113fc items=0 ppid=2848 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 07:04:39.145000 audit[2922]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.145000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff87bb3710 a2=0 a3=7fff87bb36fc items=0 ppid=2848 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 07:04:39.148000 audit[2923]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.148000 audit[2923]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1562cc80 a2=0 a3=7ffe1562cc6c items=0 ppid=2848 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 07:04:39.154000 audit[2925]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.154000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb6be06b0 a2=0 a3=7ffcb6be069c items=0 ppid=2848 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 07:04:39.157000 audit[2926]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.157000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1abd1690 a2=0 a3=7ffd1abd167c items=0 ppid=2848 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 07:04:39.163000 audit[2928]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.163000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1f371250 a2=0 a3=7ffe1f37123c items=0 ppid=2848 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 07:04:39.172000 audit[2931]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.172000 audit[2931]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4e33f3d0 a2=0 a3=7ffc4e33f3bc items=0 ppid=2848 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.172000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 07:04:39.182000 audit[2934]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.182000 audit[2934]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0c5c7f10 a2=0 a3=7ffe0c5c7efc items=0 ppid=2848 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 07:04:39.185000 audit[2935]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.185000 audit[2935]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff703f2e70 a2=0 a3=7fff703f2e5c items=0 ppid=2848 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 07:04:39.191000 audit[2937]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.191000 audit[2937]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdc43ac590 a2=0 a3=7ffdc43ac57c items=0 ppid=2848 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 07:04:39.199000 audit[2940]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2940 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.199000 audit[2940]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc100b4a40 a2=0 a3=7ffc100b4a2c items=0 ppid=2848 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 07:04:39.202000 audit[2941]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.202000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff678f15b0 a2=0 a3=7fff678f159c items=0 ppid=2848 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 07:04:39.208000 audit[2943]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2943 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 07:04:39.208000 audit[2943]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff0e2d91a0 a2=0 a3=7fff0e2d918c items=0 ppid=2848 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 07:04:39.248000 audit[2949]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:04:39.248000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffdda92b730 a2=0 a3=7ffdda92b71c items=0 ppid=2848 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:04:39.263000 audit[2949]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:04:39.263000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffdda92b730 a2=0 a3=7ffdda92b71c items=0 ppid=2848 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.263000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:04:39.271000 audit[2955]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2955 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.271000 audit[2955]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdb8538cc0 a2=0 a3=7ffdb8538cac items=0 ppid=2848 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 07:04:39.277000 audit[2957]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.277000 audit[2957]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeccc5c7c0 a2=0 a3=7ffeccc5c7ac items=0 ppid=2848 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 07:04:39.290000 audit[2960]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.290000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd69e44780 a2=0 a3=7ffd69e4476c items=0 ppid=2848 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.290000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 07:04:39.293000 audit[2961]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2961 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.293000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce0ba5500 a2=0 a3=7ffce0ba54ec items=0 ppid=2848 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 07:04:39.299000 audit[2963]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.299000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6d612290 a2=0 a3=7fff6d61227c items=0 ppid=2848 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 07:04:39.301000 audit[2964]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2964 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.301000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd03e18c00 a2=0 a3=7ffd03e18bec items=0 ppid=2848 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 07:04:39.308000 audit[2966]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.308000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea4da5d60 a2=0 a3=7ffea4da5d4c items=0 ppid=2848 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 07:04:39.317000 audit[2969]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2969 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.317000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe0ae4ffa0 a2=0 a3=7ffe0ae4ff8c items=0 ppid=2848 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 07:04:39.319000 audit[2970]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2970 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.319000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff433eda00 a2=0 a3=7fff433ed9ec items=0 ppid=2848 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 07:04:39.326000 audit[2972]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.326000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe8986cf0 a2=0 a3=7fffe8986cdc items=0 ppid=2848 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 07:04:39.328000 audit[2973]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.328000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2d8ff080 a2=0 a3=7ffe2d8ff06c items=0 ppid=2848 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 07:04:39.335000 audit[2975]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.335000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3150edf0 a2=0 a3=7ffc3150eddc items=0 ppid=2848 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 07:04:39.338418 kubelet[2572]: I0209 07:04:39.338362 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-kflpt" podStartSLOduration=2.338275187 podCreationTimestamp="2024-02-09 07:04:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 07:04:39.338056048 +0000 UTC m=+15.114506717" watchObservedRunningTime="2024-02-09 07:04:39.338275187 +0000 UTC m=+15.114725801" Feb 9 07:04:39.344000 audit[2978]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2978 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.344000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4e27c4b0 a2=0 a3=7ffe4e27c49c items=0 ppid=2848 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 07:04:39.353000 audit[2981]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.353000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff167efbf0 a2=0 a3=7fff167efbdc items=0 ppid=2848 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 07:04:39.356000 audit[2982]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2982 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.356000 audit[2982]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1736e080 a2=0 a3=7fff1736e06c items=0 ppid=2848 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 07:04:39.361000 audit[2984]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2984 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.361000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcb163c050 a2=0 a3=7ffcb163c03c items=0 ppid=2848 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 07:04:39.370000 audit[2987]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.370000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdb5eeebb0 a2=0 a3=7ffdb5eeeb9c items=0 ppid=2848 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 07:04:39.373000 audit[2988]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.373000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcec5eb10 a2=0 a3=7fffcec5eafc items=0 ppid=2848 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.373000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 07:04:39.378000 audit[2990]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2990 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.378000 audit[2990]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc9471c060 a2=0 a3=7ffc9471c04c items=0 ppid=2848 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 07:04:39.381000 audit[2991]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2991 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.381000 audit[2991]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd4671fa0 a2=0 a3=7ffdd4671f8c items=0 ppid=2848 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 07:04:39.387000 audit[2993]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2993 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.387000 audit[2993]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc3180bea0 a2=0 a3=7ffc3180be8c items=0 ppid=2848 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 07:04:39.395000 audit[2996]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2996 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 07:04:39.395000 audit[2996]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd4363fcb0 a2=0 a3=7ffd4363fc9c items=0 ppid=2848 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 07:04:39.403000 audit[2998]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2998 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 07:04:39.403000 audit[2998]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc5c62c7d0 a2=0 a3=7ffc5c62c7bc items=0 ppid=2848 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.403000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:04:39.404000 audit[2998]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2998 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 07:04:39.404000 audit[2998]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc5c62c7d0 a2=0 a3=7ffc5c62c7bc items=0 ppid=2848 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:39.404000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:04:39.567956 sshd[2790]: Invalid user ftpadmin from 144.91.92.112 port 43454 Feb 9 07:04:39.574309 sshd[2790]: pam_faillock(sshd:auth): User unknown Feb 9 07:04:39.575331 sshd[2790]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:04:39.575420 sshd[2790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.92.112 Feb 9 07:04:39.576404 sshd[2790]: pam_faillock(sshd:auth): User unknown Feb 9 07:04:39.575000 audit[2790]: USER_AUTH pid=2790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftpadmin" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:04:40.556806 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount862142118.mount: Deactivated successfully. Feb 9 07:04:41.328962 env[1474]: time="2024-02-09T07:04:41.328930117Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:41.329579 env[1474]: time="2024-02-09T07:04:41.329504554Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:41.330450 env[1474]: time="2024-02-09T07:04:41.330407449Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:41.331243 env[1474]: time="2024-02-09T07:04:41.331225645Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:41.332022 env[1474]: time="2024-02-09T07:04:41.331979125Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 07:04:41.332851 env[1474]: time="2024-02-09T07:04:41.332807890Z" level=info msg="CreateContainer within sandbox \"8dbd287776abd99360313391ea065737112f18c7efdc1045b2a835b0a5ecd12c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 07:04:41.337299 env[1474]: time="2024-02-09T07:04:41.337254799Z" level=info msg="CreateContainer within sandbox \"8dbd287776abd99360313391ea065737112f18c7efdc1045b2a835b0a5ecd12c\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"c9f0efae66325d403d6074d9fc97e09fdfc3103441b01d9a6bc8c018797ff97f\"" Feb 9 07:04:41.337584 env[1474]: time="2024-02-09T07:04:41.337552167Z" level=info msg="StartContainer for \"c9f0efae66325d403d6074d9fc97e09fdfc3103441b01d9a6bc8c018797ff97f\"" Feb 9 07:04:41.360317 systemd[1]: Started cri-containerd-c9f0efae66325d403d6074d9fc97e09fdfc3103441b01d9a6bc8c018797ff97f.scope. Feb 9 07:04:41.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit: BPF prog-id=117 op=LOAD Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2799 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:41.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339663065666165363633323564343033643630373464396663393765 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2799 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:41.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339663065666165363633323564343033643630373464396663393765 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit: BPF prog-id=118 op=LOAD Feb 9 07:04:41.365000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002450c0 items=0 ppid=2799 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:41.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339663065666165363633323564343033643630373464396663393765 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit: BPF prog-id=119 op=LOAD Feb 9 07:04:41.365000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000245108 items=0 ppid=2799 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:41.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339663065666165363633323564343033643630373464396663393765 Feb 9 07:04:41.365000 audit: BPF prog-id=119 op=UNLOAD Feb 9 07:04:41.365000 audit: BPF prog-id=118 op=UNLOAD Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:41.365000 audit: BPF prog-id=120 op=LOAD Feb 9 07:04:41.365000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000245518 items=0 ppid=2799 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:41.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339663065666165363633323564343033643630373464396663393765 Feb 9 07:04:41.385409 env[1474]: time="2024-02-09T07:04:41.385381235Z" level=info msg="StartContainer for \"c9f0efae66325d403d6074d9fc97e09fdfc3103441b01d9a6bc8c018797ff97f\" returns successfully" Feb 9 07:04:41.505608 sshd[2790]: Failed password for invalid user ftpadmin from 144.91.92.112 port 43454 ssh2 Feb 9 07:04:42.329852 sshd[2790]: Received disconnect from 144.91.92.112 port 43454:11: Bye Bye [preauth] Feb 9 07:04:42.329852 sshd[2790]: Disconnected from invalid user ftpadmin 144.91.92.112 port 43454 [preauth] Feb 9 07:04:42.332465 systemd[1]: sshd@7-139.178.90.101:22-144.91.92.112:43454.service: Deactivated successfully. Feb 9 07:04:42.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.101:22-144.91.92.112:43454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:42.345368 kubelet[2572]: I0209 07:04:42.345324 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-8lt8c" podStartSLOduration=2.98192965 podCreationTimestamp="2024-02-09 07:04:37 +0000 UTC" firstStartedPulling="2024-02-09 07:04:38.968742278 +0000 UTC m=+14.745192846" lastFinishedPulling="2024-02-09 07:04:41.332114776 +0000 UTC m=+17.108565343" observedRunningTime="2024-02-09 07:04:42.345031154 +0000 UTC m=+18.121481726" watchObservedRunningTime="2024-02-09 07:04:42.345302147 +0000 UTC m=+18.121752714" Feb 9 07:04:43.240000 audit[3053]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:04:43.268892 kernel: kauditd_printk_skb: 360 callbacks suppressed Feb 9 07:04:43.268931 kernel: audit: type=1325 audit(1707462283.240:1050): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:04:43.328569 kernel: audit: type=1300 audit(1707462283.240:1050): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc88d42a70 a2=0 a3=7ffc88d42a5c items=0 ppid=2848 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.240000 audit[3053]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc88d42a70 a2=0 a3=7ffc88d42a5c items=0 ppid=2848 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.354199 kubelet[2572]: I0209 07:04:43.354176 2572 topology_manager.go:215] "Topology Admit Handler" podUID="7c019a4f-072f-498e-88bb-d025d7bc3996" podNamespace="calico-system" podName="calico-typha-856b954977-zww5m" Feb 9 07:04:43.357271 systemd[1]: Created slice kubepods-besteffort-pod7c019a4f_072f_498e_88bb_d025d7bc3996.slice. Feb 9 07:04:43.373994 kubelet[2572]: I0209 07:04:43.373970 2572 topology_manager.go:215] "Topology Admit Handler" podUID="31b0e24a-5bee-4481-a936-8508d9f63f86" podNamespace="calico-system" podName="calico-node-lgdbf" Feb 9 07:04:43.376783 systemd[1]: Created slice kubepods-besteffort-pod31b0e24a_5bee_4481_a936_8508d9f63f86.slice. Feb 9 07:04:43.240000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:04:43.479562 kubelet[2572]: I0209 07:04:43.479545 2572 topology_manager.go:215] "Topology Admit Handler" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" podNamespace="calico-system" podName="csi-node-driver-zdgpx" Feb 9 07:04:43.479714 kubelet[2572]: E0209 07:04:43.479708 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:04:43.485805 kernel: audit: type=1327 audit(1707462283.240:1050): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:04:43.485902 kubelet[2572]: I0209 07:04:43.485868 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/7c019a4f-072f-498e-88bb-d025d7bc3996-typha-certs\") pod \"calico-typha-856b954977-zww5m\" (UID: \"7c019a4f-072f-498e-88bb-d025d7bc3996\") " pod="calico-system/calico-typha-856b954977-zww5m" Feb 9 07:04:43.485902 kubelet[2572]: I0209 07:04:43.485899 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/31b0e24a-5bee-4481-a936-8508d9f63f86-policysync\") pod \"calico-node-lgdbf\" (UID: \"31b0e24a-5bee-4481-a936-8508d9f63f86\") " pod="calico-system/calico-node-lgdbf" Feb 9 07:04:43.485975 kubelet[2572]: I0209 07:04:43.485921 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/31b0e24a-5bee-4481-a936-8508d9f63f86-var-lib-calico\") pod \"calico-node-lgdbf\" (UID: \"31b0e24a-5bee-4481-a936-8508d9f63f86\") " pod="calico-system/calico-node-lgdbf" Feb 9 07:04:43.485975 kubelet[2572]: I0209 07:04:43.485962 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/31b0e24a-5bee-4481-a936-8508d9f63f86-flexvol-driver-host\") pod \"calico-node-lgdbf\" (UID: \"31b0e24a-5bee-4481-a936-8508d9f63f86\") " pod="calico-system/calico-node-lgdbf" Feb 9 07:04:43.486040 kubelet[2572]: I0209 07:04:43.486028 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6sw7z\" (UniqueName: \"kubernetes.io/projected/7c019a4f-072f-498e-88bb-d025d7bc3996-kube-api-access-6sw7z\") pod \"calico-typha-856b954977-zww5m\" (UID: \"7c019a4f-072f-498e-88bb-d025d7bc3996\") " pod="calico-system/calico-typha-856b954977-zww5m" Feb 9 07:04:43.486085 kubelet[2572]: I0209 07:04:43.486068 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/31b0e24a-5bee-4481-a936-8508d9f63f86-lib-modules\") pod \"calico-node-lgdbf\" (UID: \"31b0e24a-5bee-4481-a936-8508d9f63f86\") " pod="calico-system/calico-node-lgdbf" Feb 9 07:04:43.486124 kubelet[2572]: I0209 07:04:43.486104 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/31b0e24a-5bee-4481-a936-8508d9f63f86-cni-net-dir\") pod \"calico-node-lgdbf\" (UID: \"31b0e24a-5bee-4481-a936-8508d9f63f86\") " pod="calico-system/calico-node-lgdbf" Feb 9 07:04:43.486157 kubelet[2572]: I0209 07:04:43.486131 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/31b0e24a-5bee-4481-a936-8508d9f63f86-cni-log-dir\") pod \"calico-node-lgdbf\" (UID: \"31b0e24a-5bee-4481-a936-8508d9f63f86\") " pod="calico-system/calico-node-lgdbf" Feb 9 07:04:43.486191 kubelet[2572]: I0209 07:04:43.486170 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/31b0e24a-5bee-4481-a936-8508d9f63f86-tigera-ca-bundle\") pod \"calico-node-lgdbf\" (UID: \"31b0e24a-5bee-4481-a936-8508d9f63f86\") " pod="calico-system/calico-node-lgdbf" Feb 9 07:04:43.486220 kubelet[2572]: I0209 07:04:43.486192 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7t4zm\" (UniqueName: \"kubernetes.io/projected/31b0e24a-5bee-4481-a936-8508d9f63f86-kube-api-access-7t4zm\") pod \"calico-node-lgdbf\" (UID: \"31b0e24a-5bee-4481-a936-8508d9f63f86\") " pod="calico-system/calico-node-lgdbf" Feb 9 07:04:43.486220 kubelet[2572]: I0209 07:04:43.486215 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7c019a4f-072f-498e-88bb-d025d7bc3996-tigera-ca-bundle\") pod \"calico-typha-856b954977-zww5m\" (UID: \"7c019a4f-072f-498e-88bb-d025d7bc3996\") " pod="calico-system/calico-typha-856b954977-zww5m" Feb 9 07:04:43.486280 kubelet[2572]: I0209 07:04:43.486243 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/31b0e24a-5bee-4481-a936-8508d9f63f86-cni-bin-dir\") pod \"calico-node-lgdbf\" (UID: \"31b0e24a-5bee-4481-a936-8508d9f63f86\") " pod="calico-system/calico-node-lgdbf" Feb 9 07:04:43.486305 kubelet[2572]: I0209 07:04:43.486279 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/31b0e24a-5bee-4481-a936-8508d9f63f86-xtables-lock\") pod \"calico-node-lgdbf\" (UID: \"31b0e24a-5bee-4481-a936-8508d9f63f86\") " pod="calico-system/calico-node-lgdbf" Feb 9 07:04:43.486325 kubelet[2572]: I0209 07:04:43.486316 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/31b0e24a-5bee-4481-a936-8508d9f63f86-node-certs\") pod \"calico-node-lgdbf\" (UID: \"31b0e24a-5bee-4481-a936-8508d9f63f86\") " pod="calico-system/calico-node-lgdbf" Feb 9 07:04:43.486382 kubelet[2572]: I0209 07:04:43.486373 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/31b0e24a-5bee-4481-a936-8508d9f63f86-var-run-calico\") pod \"calico-node-lgdbf\" (UID: \"31b0e24a-5bee-4481-a936-8508d9f63f86\") " pod="calico-system/calico-node-lgdbf" Feb 9 07:04:43.241000 audit[3053]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:04:43.241000 audit[3053]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc88d42a70 a2=0 a3=31030 items=0 ppid=2848 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.586651 kubelet[2572]: I0209 07:04:43.586607 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5ptr7\" (UniqueName: \"kubernetes.io/projected/90d9a61d-54e4-4233-89c7-8c213472c556-kube-api-access-5ptr7\") pod \"csi-node-driver-zdgpx\" (UID: \"90d9a61d-54e4-4233-89c7-8c213472c556\") " pod="calico-system/csi-node-driver-zdgpx" Feb 9 07:04:43.586754 kubelet[2572]: I0209 07:04:43.586686 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/90d9a61d-54e4-4233-89c7-8c213472c556-registration-dir\") pod \"csi-node-driver-zdgpx\" (UID: \"90d9a61d-54e4-4233-89c7-8c213472c556\") " pod="calico-system/csi-node-driver-zdgpx" Feb 9 07:04:43.586754 kubelet[2572]: I0209 07:04:43.586721 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/90d9a61d-54e4-4233-89c7-8c213472c556-kubelet-dir\") pod \"csi-node-driver-zdgpx\" (UID: \"90d9a61d-54e4-4233-89c7-8c213472c556\") " pod="calico-system/csi-node-driver-zdgpx" Feb 9 07:04:43.586804 kubelet[2572]: I0209 07:04:43.586760 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/90d9a61d-54e4-4233-89c7-8c213472c556-varrun\") pod \"csi-node-driver-zdgpx\" (UID: \"90d9a61d-54e4-4233-89c7-8c213472c556\") " pod="calico-system/csi-node-driver-zdgpx" Feb 9 07:04:43.586804 kubelet[2572]: I0209 07:04:43.586785 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/90d9a61d-54e4-4233-89c7-8c213472c556-socket-dir\") pod \"csi-node-driver-zdgpx\" (UID: \"90d9a61d-54e4-4233-89c7-8c213472c556\") " pod="calico-system/csi-node-driver-zdgpx" Feb 9 07:04:43.587246 kubelet[2572]: E0209 07:04:43.587235 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.587246 kubelet[2572]: W0209 07:04:43.587244 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.587333 kubelet[2572]: E0209 07:04:43.587259 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.587369 kubelet[2572]: E0209 07:04:43.587345 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.587369 kubelet[2572]: W0209 07:04:43.587351 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.587369 kubelet[2572]: E0209 07:04:43.587362 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.587460 kubelet[2572]: E0209 07:04:43.587449 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.587460 kubelet[2572]: W0209 07:04:43.587453 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.587460 kubelet[2572]: E0209 07:04:43.587461 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.587585 kubelet[2572]: E0209 07:04:43.587576 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.587622 kubelet[2572]: W0209 07:04:43.587585 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.587622 kubelet[2572]: E0209 07:04:43.587601 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.587693 kubelet[2572]: E0209 07:04:43.587687 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.587715 kubelet[2572]: W0209 07:04:43.587693 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.587715 kubelet[2572]: E0209 07:04:43.587705 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.587798 kubelet[2572]: E0209 07:04:43.587792 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.587819 kubelet[2572]: W0209 07:04:43.587798 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.587819 kubelet[2572]: E0209 07:04:43.587809 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.587890 kubelet[2572]: E0209 07:04:43.587884 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.587912 kubelet[2572]: W0209 07:04:43.587891 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.587912 kubelet[2572]: E0209 07:04:43.587901 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.587981 kubelet[2572]: E0209 07:04:43.587976 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.588000 kubelet[2572]: W0209 07:04:43.587982 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.588000 kubelet[2572]: E0209 07:04:43.587992 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.588087 kubelet[2572]: E0209 07:04:43.588081 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.588107 kubelet[2572]: W0209 07:04:43.588088 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.588107 kubelet[2572]: E0209 07:04:43.588099 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.588176 kubelet[2572]: E0209 07:04:43.588171 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.588196 kubelet[2572]: W0209 07:04:43.588177 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.588196 kubelet[2572]: E0209 07:04:43.588188 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.588279 kubelet[2572]: E0209 07:04:43.588274 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.588302 kubelet[2572]: W0209 07:04:43.588280 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.588302 kubelet[2572]: E0209 07:04:43.588288 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.588389 kubelet[2572]: E0209 07:04:43.588383 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.588420 kubelet[2572]: W0209 07:04:43.588389 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.588420 kubelet[2572]: E0209 07:04:43.588399 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.588478 kubelet[2572]: E0209 07:04:43.588473 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.588478 kubelet[2572]: W0209 07:04:43.588478 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.588530 kubelet[2572]: E0209 07:04:43.588484 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.588598 kubelet[2572]: E0209 07:04:43.588591 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.588621 kubelet[2572]: W0209 07:04:43.588599 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.588621 kubelet[2572]: E0209 07:04:43.588613 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.588697 kubelet[2572]: E0209 07:04:43.588691 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.588721 kubelet[2572]: W0209 07:04:43.588698 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.588721 kubelet[2572]: E0209 07:04:43.588709 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.588814 kubelet[2572]: E0209 07:04:43.588808 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.588836 kubelet[2572]: W0209 07:04:43.588815 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.588836 kubelet[2572]: E0209 07:04:43.588826 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.588912 kubelet[2572]: E0209 07:04:43.588907 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.588934 kubelet[2572]: W0209 07:04:43.588913 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.588934 kubelet[2572]: E0209 07:04:43.588924 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.589020 kubelet[2572]: E0209 07:04:43.589015 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.589040 kubelet[2572]: W0209 07:04:43.589021 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.589040 kubelet[2572]: E0209 07:04:43.589032 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.589112 kubelet[2572]: E0209 07:04:43.589107 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.589133 kubelet[2572]: W0209 07:04:43.589113 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.589133 kubelet[2572]: E0209 07:04:43.589121 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.589209 kubelet[2572]: E0209 07:04:43.589203 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.589237 kubelet[2572]: W0209 07:04:43.589209 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.589237 kubelet[2572]: E0209 07:04:43.589219 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.592313 kubelet[2572]: E0209 07:04:43.592302 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.592313 kubelet[2572]: W0209 07:04:43.592310 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.592313 kubelet[2572]: E0209 07:04:43.592319 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.592834 kubelet[2572]: E0209 07:04:43.592828 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.592866 kubelet[2572]: W0209 07:04:43.592838 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.592866 kubelet[2572]: E0209 07:04:43.592846 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.643919 kernel: audit: type=1325 audit(1707462283.241:1051): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:04:43.643998 kernel: audit: type=1300 audit(1707462283.241:1051): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc88d42a70 a2=0 a3=31030 items=0 ppid=2848 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.644030 kernel: audit: type=1327 audit(1707462283.241:1051): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:04:43.241000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:04:43.659129 env[1474]: time="2024-02-09T07:04:43.659102962Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-856b954977-zww5m,Uid:7c019a4f-072f-498e-88bb-d025d7bc3996,Namespace:calico-system,Attempt:0,}" Feb 9 07:04:43.666331 env[1474]: time="2024-02-09T07:04:43.666293515Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 07:04:43.666331 env[1474]: time="2024-02-09T07:04:43.666317665Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 07:04:43.666469 env[1474]: time="2024-02-09T07:04:43.666328875Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 07:04:43.666469 env[1474]: time="2024-02-09T07:04:43.666409660Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2c0263da95293ed0550320ec503cc370987a15b7a1920db4bfacd4f6405383e7 pid=3090 runtime=io.containerd.runc.v2 Feb 9 07:04:43.678589 env[1474]: time="2024-02-09T07:04:43.678566392Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lgdbf,Uid:31b0e24a-5bee-4481-a936-8508d9f63f86,Namespace:calico-system,Attempt:0,}" Feb 9 07:04:43.685349 env[1474]: time="2024-02-09T07:04:43.685315894Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 07:04:43.685349 env[1474]: time="2024-02-09T07:04:43.685337662Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 07:04:43.685349 env[1474]: time="2024-02-09T07:04:43.685344366Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 07:04:43.685475 env[1474]: time="2024-02-09T07:04:43.685402891Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/24c75908657fc191a0c4edb8c2fcd48a9a92039737f4b1cb052b4b1177f5ab78 pid=3112 runtime=io.containerd.runc.v2 Feb 9 07:04:43.688786 kubelet[2572]: E0209 07:04:43.688740 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.688786 kubelet[2572]: W0209 07:04:43.688751 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.688786 kubelet[2572]: E0209 07:04:43.688766 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.688898 kubelet[2572]: E0209 07:04:43.688890 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.688898 kubelet[2572]: W0209 07:04:43.688895 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.688952 kubelet[2572]: E0209 07:04:43.688905 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.689023 kubelet[2572]: E0209 07:04:43.689016 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.689023 kubelet[2572]: W0209 07:04:43.689022 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.689072 kubelet[2572]: E0209 07:04:43.689031 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.689114 kubelet[2572]: E0209 07:04:43.689108 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.689114 kubelet[2572]: W0209 07:04:43.689113 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.689173 kubelet[2572]: E0209 07:04:43.689120 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.689223 kubelet[2572]: E0209 07:04:43.689216 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.689256 kubelet[2572]: W0209 07:04:43.689224 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.689256 kubelet[2572]: E0209 07:04:43.689237 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.689330 kubelet[2572]: E0209 07:04:43.689324 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.689330 kubelet[2572]: W0209 07:04:43.689329 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.689391 kubelet[2572]: E0209 07:04:43.689340 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.689436 kubelet[2572]: E0209 07:04:43.689430 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.689471 kubelet[2572]: W0209 07:04:43.689436 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.689471 kubelet[2572]: E0209 07:04:43.689447 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.689574 kubelet[2572]: E0209 07:04:43.689567 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.689574 kubelet[2572]: W0209 07:04:43.689572 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.689642 kubelet[2572]: E0209 07:04:43.689583 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.689712 kubelet[2572]: E0209 07:04:43.689707 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.689712 kubelet[2572]: W0209 07:04:43.689712 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.689773 kubelet[2572]: E0209 07:04:43.689722 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.689812 kubelet[2572]: E0209 07:04:43.689806 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.689812 kubelet[2572]: W0209 07:04:43.689811 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.689874 kubelet[2572]: E0209 07:04:43.689821 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.689909 kubelet[2572]: E0209 07:04:43.689903 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.689933 kubelet[2572]: W0209 07:04:43.689909 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.689933 kubelet[2572]: E0209 07:04:43.689918 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.690046 kubelet[2572]: E0209 07:04:43.690041 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.690070 kubelet[2572]: W0209 07:04:43.690046 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.690070 kubelet[2572]: E0209 07:04:43.690054 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.690181 kubelet[2572]: E0209 07:04:43.690176 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.690205 kubelet[2572]: W0209 07:04:43.690181 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.690205 kubelet[2572]: E0209 07:04:43.690194 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.690283 kubelet[2572]: E0209 07:04:43.690278 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.690314 kubelet[2572]: W0209 07:04:43.690283 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.690314 kubelet[2572]: E0209 07:04:43.690298 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.690355 kubelet[2572]: E0209 07:04:43.690348 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.690355 kubelet[2572]: W0209 07:04:43.690352 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.690402 kubelet[2572]: E0209 07:04:43.690367 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.690430 kubelet[2572]: E0209 07:04:43.690414 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.690430 kubelet[2572]: W0209 07:04:43.690419 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.690482 kubelet[2572]: E0209 07:04:43.690433 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.690482 kubelet[2572]: E0209 07:04:43.690480 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.690533 kubelet[2572]: W0209 07:04:43.690484 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.690533 kubelet[2572]: E0209 07:04:43.690495 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.690576 kubelet[2572]: E0209 07:04:43.690561 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.690576 kubelet[2572]: W0209 07:04:43.690566 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.690576 kubelet[2572]: E0209 07:04:43.690574 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.690717 kubelet[2572]: E0209 07:04:43.690711 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.690717 kubelet[2572]: W0209 07:04:43.690716 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.690766 kubelet[2572]: E0209 07:04:43.690724 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.690798 kubelet[2572]: E0209 07:04:43.690793 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.690822 kubelet[2572]: W0209 07:04:43.690798 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.690822 kubelet[2572]: E0209 07:04:43.690807 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.690901 kubelet[2572]: E0209 07:04:43.690897 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.690925 kubelet[2572]: W0209 07:04:43.690901 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.690925 kubelet[2572]: E0209 07:04:43.690909 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.690992 kubelet[2572]: E0209 07:04:43.690987 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.691014 kubelet[2572]: W0209 07:04:43.690992 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.691014 kubelet[2572]: E0209 07:04:43.691000 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.691075 kubelet[2572]: E0209 07:04:43.691069 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.691095 kubelet[2572]: W0209 07:04:43.691075 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.691095 kubelet[2572]: E0209 07:04:43.691083 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.691159 kubelet[2572]: E0209 07:04:43.691154 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.691159 kubelet[2572]: W0209 07:04:43.691159 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.691204 kubelet[2572]: E0209 07:04:43.691165 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.691249 kubelet[2572]: E0209 07:04:43.691245 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.691271 kubelet[2572]: W0209 07:04:43.691249 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.691271 kubelet[2572]: E0209 07:04:43.691255 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.695296 kubelet[2572]: E0209 07:04:43.695287 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 07:04:43.695296 kubelet[2572]: W0209 07:04:43.695293 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 07:04:43.695363 kubelet[2572]: E0209 07:04:43.695301 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 07:04:43.706028 systemd[1]: Started cri-containerd-24c75908657fc191a0c4edb8c2fcd48a9a92039737f4b1cb052b4b1177f5ab78.scope. Feb 9 07:04:43.489000 audit[3055]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:04:43.489000 audit[3055]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd47072130 a2=0 a3=7ffd4707211c items=0 ppid=2848 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.768652 systemd[1]: Started cri-containerd-2c0263da95293ed0550320ec503cc370987a15b7a1920db4bfacd4f6405383e7.scope. Feb 9 07:04:43.866005 kernel: audit: type=1325 audit(1707462283.489:1052): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:04:43.866067 kernel: audit: type=1300 audit(1707462283.489:1052): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd47072130 a2=0 a3=7ffd4707211c items=0 ppid=2848 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.866090 kernel: audit: type=1327 audit(1707462283.489:1052): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:04:43.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:04:43.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.925505 kernel: audit: type=1400 audit(1707462283.710:1053): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.766000 audit: BPF prog-id=121 op=LOAD Feb 9 07:04:43.767000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.767000 audit[3122]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3112 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633735393038363537666331393161306334656462386332666364 Feb 9 07:04:43.767000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.767000 audit[3122]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3112 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633735393038363537666331393161306334656462386332666364 Feb 9 07:04:43.767000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.767000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.767000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.767000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.767000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.767000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.767000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.767000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.767000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.767000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.767000 audit: BPF prog-id=122 op=LOAD Feb 9 07:04:43.767000 audit[3122]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001dd7d0 items=0 ppid=3112 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633735393038363537666331393161306334656462386332666364 Feb 9 07:04:43.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit: BPF prog-id=123 op=LOAD Feb 9 07:04:43.924000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3090 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263303236336461393532393365643035353033323065633530336363 Feb 9 07:04:43.924000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3090 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263303236336461393532393365643035353033323065633530336363 Feb 9 07:04:43.924000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.707000 audit[3055]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:04:43.924000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit: BPF prog-id=124 op=LOAD Feb 9 07:04:43.707000 audit[3055]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd47072130 a2=0 a3=31030 items=0 ppid=2848 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.707000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:04:43.924000 audit[3122]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001dd818 items=0 ppid=3112 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633735393038363537666331393161306334656462386332666364 Feb 9 07:04:43.988000 audit: BPF prog-id=124 op=UNLOAD Feb 9 07:04:43.988000 audit: BPF prog-id=122 op=UNLOAD Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit: BPF prog-id=125 op=LOAD Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.924000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00037e700 items=0 ppid=3090 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263303236336461393532393365643035353033323065633530336363 Feb 9 07:04:43.988000 audit[3122]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c000197c30 a2=78 a3=c0001ddc28 items=0 ppid=3112 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633735393038363537666331393161306334656462386332666364 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit: BPF prog-id=126 op=LOAD Feb 9 07:04:43.988000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00037e748 items=0 ppid=3090 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.988000 audit: BPF prog-id=127 op=LOAD Feb 9 07:04:43.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263303236336461393532393365643035353033323065633530336363 Feb 9 07:04:43.988000 audit[3122]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001ddc28 items=0 ppid=3112 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633735393038363537666331393161306334656462386332666364 Feb 9 07:04:43.988000 audit: BPF prog-id=126 op=UNLOAD Feb 9 07:04:43.988000 audit: BPF prog-id=125 op=UNLOAD Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:43.988000 audit: BPF prog-id=128 op=LOAD Feb 9 07:04:43.988000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00037eb58 items=0 ppid=3090 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:43.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263303236336461393532393365643035353033323065633530336363 Feb 9 07:04:44.006297 env[1474]: time="2024-02-09T07:04:44.006269576Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lgdbf,Uid:31b0e24a-5bee-4481-a936-8508d9f63f86,Namespace:calico-system,Attempt:0,} returns sandbox id \"24c75908657fc191a0c4edb8c2fcd48a9a92039737f4b1cb052b4b1177f5ab78\"" Feb 9 07:04:44.007005 env[1474]: time="2024-02-09T07:04:44.006989141Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 07:04:44.018061 env[1474]: time="2024-02-09T07:04:44.018042250Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-856b954977-zww5m,Uid:7c019a4f-072f-498e-88bb-d025d7bc3996,Namespace:calico-system,Attempt:0,} returns sandbox id \"2c0263da95293ed0550320ec503cc370987a15b7a1920db4bfacd4f6405383e7\"" Feb 9 07:04:45.280206 kubelet[2572]: E0209 07:04:45.280150 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:04:47.280701 kubelet[2572]: E0209 07:04:47.280634 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:04:49.281019 kubelet[2572]: E0209 07:04:49.280913 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:04:51.281349 kubelet[2572]: E0209 07:04:51.281242 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:04:53.280731 kubelet[2572]: E0209 07:04:53.280665 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:04:54.134499 env[1474]: time="2024-02-09T07:04:54.134443706Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:54.135126 env[1474]: time="2024-02-09T07:04:54.135087349Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:54.136461 env[1474]: time="2024-02-09T07:04:54.136421150Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:54.137412 env[1474]: time="2024-02-09T07:04:54.137371755Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:04:54.138409 env[1474]: time="2024-02-09T07:04:54.138366580Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 07:04:54.138728 env[1474]: time="2024-02-09T07:04:54.138714584Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 07:04:54.139606 env[1474]: time="2024-02-09T07:04:54.139575804Z" level=info msg="CreateContainer within sandbox \"24c75908657fc191a0c4edb8c2fcd48a9a92039737f4b1cb052b4b1177f5ab78\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 07:04:54.144090 env[1474]: time="2024-02-09T07:04:54.144072800Z" level=info msg="CreateContainer within sandbox \"24c75908657fc191a0c4edb8c2fcd48a9a92039737f4b1cb052b4b1177f5ab78\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7ad638d607dfe7231e851b9a4a8c8a844d6119c805ce3874a383e64e3f3d2013\"" Feb 9 07:04:54.144314 env[1474]: time="2024-02-09T07:04:54.144303092Z" level=info msg="StartContainer for \"7ad638d607dfe7231e851b9a4a8c8a844d6119c805ce3874a383e64e3f3d2013\"" Feb 9 07:04:54.164542 systemd[1]: Started cri-containerd-7ad638d607dfe7231e851b9a4a8c8a844d6119c805ce3874a383e64e3f3d2013.scope. Feb 9 07:04:54.171000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.200350 kernel: kauditd_printk_skb: 133 callbacks suppressed Feb 9 07:04:54.200413 kernel: audit: type=1400 audit(1707462294.171:1091): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.171000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3112 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:54.265500 kernel: audit: type=1300 audit(1707462294.171:1091): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3112 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:54.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643633386436303764666537323331653835316239613461386338 Feb 9 07:04:54.455776 kernel: audit: type=1327 audit(1707462294.171:1091): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643633386436303764666537323331653835316239613461386338 Feb 9 07:04:54.455813 kernel: audit: type=1400 audit(1707462294.171:1092): avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.171000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.171000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.583527 kernel: audit: type=1400 audit(1707462294.171:1092): avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.583562 kernel: audit: type=1400 audit(1707462294.171:1092): avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.171000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.171000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.665154 env[1474]: time="2024-02-09T07:04:54.665127732Z" level=info msg="StartContainer for \"7ad638d607dfe7231e851b9a4a8c8a844d6119c805ce3874a383e64e3f3d2013\" returns successfully" Feb 9 07:04:54.711678 kernel: audit: type=1400 audit(1707462294.171:1092): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.711762 kernel: audit: type=1400 audit(1707462294.171:1092): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.171000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.711980 systemd[1]: cri-containerd-7ad638d607dfe7231e851b9a4a8c8a844d6119c805ce3874a383e64e3f3d2013.scope: Deactivated successfully. Feb 9 07:04:54.171000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.776508 kernel: audit: type=1400 audit(1707462294.171:1092): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.791192 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7ad638d607dfe7231e851b9a4a8c8a844d6119c805ce3874a383e64e3f3d2013-rootfs.mount: Deactivated successfully. Feb 9 07:04:54.840500 kernel: audit: type=1400 audit(1707462294.171:1092): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.171000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.171000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.171000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.171000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.171000 audit: BPF prog-id=129 op=LOAD Feb 9 07:04:54.171000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00026fc70 items=0 ppid=3112 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:54.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643633386436303764666537323331653835316239613461386338 Feb 9 07:04:54.263000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.263000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.263000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.263000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.263000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.263000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.263000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.263000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.263000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.263000 audit: BPF prog-id=130 op=LOAD Feb 9 07:04:54.263000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00026fcb8 items=0 ppid=3112 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:54.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643633386436303764666537323331653835316239613461386338 Feb 9 07:04:54.454000 audit: BPF prog-id=130 op=UNLOAD Feb 9 07:04:54.454000 audit: BPF prog-id=129 op=UNLOAD Feb 9 07:04:54.454000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.454000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.454000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.454000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.454000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.454000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.454000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.454000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.454000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.454000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:04:54.454000 audit: BPF prog-id=131 op=LOAD Feb 9 07:04:54.454000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00026fd48 items=0 ppid=3112 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:04:54.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643633386436303764666537323331653835316239613461386338 Feb 9 07:04:54.840000 audit: BPF prog-id=131 op=UNLOAD Feb 9 07:04:55.068643 env[1474]: time="2024-02-09T07:04:55.068486275Z" level=info msg="shim disconnected" id=7ad638d607dfe7231e851b9a4a8c8a844d6119c805ce3874a383e64e3f3d2013 Feb 9 07:04:55.068643 env[1474]: time="2024-02-09T07:04:55.068601338Z" level=warning msg="cleaning up after shim disconnected" id=7ad638d607dfe7231e851b9a4a8c8a844d6119c805ce3874a383e64e3f3d2013 namespace=k8s.io Feb 9 07:04:55.068643 env[1474]: time="2024-02-09T07:04:55.068629565Z" level=info msg="cleaning up dead shim" Feb 9 07:04:55.096719 env[1474]: time="2024-02-09T07:04:55.096612117Z" level=warning msg="cleanup warnings time=\"2024-02-09T07:04:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3238 runtime=io.containerd.runc.v2\n" Feb 9 07:04:55.280684 kubelet[2572]: E0209 07:04:55.280591 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:04:57.281096 kubelet[2572]: E0209 07:04:57.280982 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:04:58.262918 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4029968417.mount: Deactivated successfully. Feb 9 07:04:59.280360 kubelet[2572]: E0209 07:04:59.280253 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:01.280436 kubelet[2572]: E0209 07:05:01.280330 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:03.281231 kubelet[2572]: E0209 07:05:03.281134 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:05.280689 kubelet[2572]: E0209 07:05:05.280587 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:07.281159 kubelet[2572]: E0209 07:05:07.281035 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:09.280719 kubelet[2572]: E0209 07:05:09.280617 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:11.281438 kubelet[2572]: E0209 07:05:11.281309 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:12.360811 systemd[1]: Started sshd@8-139.178.90.101:22-74.121.149.150:54274.service. Feb 9 07:05:12.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.101:22-74.121.149.150:54274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:05:12.387918 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 07:05:12.387962 kernel: audit: type=1130 audit(1707462312.359:1098): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.101:22-74.121.149.150:54274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:05:13.280719 kubelet[2572]: E0209 07:05:13.280639 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:14.958819 sshd[3259]: Invalid user luca from 74.121.149.150 port 54274 Feb 9 07:05:14.960193 sshd[3259]: pam_faillock(sshd:auth): User unknown Feb 9 07:05:14.960413 sshd[3259]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:05:14.960435 sshd[3259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.121.149.150 Feb 9 07:05:14.960657 sshd[3259]: pam_faillock(sshd:auth): User unknown Feb 9 07:05:14.959000 audit[3259]: USER_AUTH pid=3259 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="luca" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:05:15.053505 kernel: audit: type=1100 audit(1707462314.959:1099): pid=3259 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="luca" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:05:15.187227 env[1474]: time="2024-02-09T07:05:15.187175151Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:05:15.187821 env[1474]: time="2024-02-09T07:05:15.187774051Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:05:15.189127 env[1474]: time="2024-02-09T07:05:15.189087013Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:05:15.189987 env[1474]: time="2024-02-09T07:05:15.189953122Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:05:15.190868 env[1474]: time="2024-02-09T07:05:15.190826801Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 07:05:15.191213 env[1474]: time="2024-02-09T07:05:15.191135395Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 07:05:15.194721 env[1474]: time="2024-02-09T07:05:15.194704300Z" level=info msg="CreateContainer within sandbox \"2c0263da95293ed0550320ec503cc370987a15b7a1920db4bfacd4f6405383e7\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 07:05:15.198748 env[1474]: time="2024-02-09T07:05:15.198716262Z" level=info msg="CreateContainer within sandbox \"2c0263da95293ed0550320ec503cc370987a15b7a1920db4bfacd4f6405383e7\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"a5bfb5bbf9bbd684b84f039f4892ec749ad43b8f4bde6aa5a05bdb3b19f8f9a4\"" Feb 9 07:05:15.198958 env[1474]: time="2024-02-09T07:05:15.198933818Z" level=info msg="StartContainer for \"a5bfb5bbf9bbd684b84f039f4892ec749ad43b8f4bde6aa5a05bdb3b19f8f9a4\"" Feb 9 07:05:15.228912 systemd[1]: Started cri-containerd-a5bfb5bbf9bbd684b84f039f4892ec749ad43b8f4bde6aa5a05bdb3b19f8f9a4.scope. Feb 9 07:05:15.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.280387 kubelet[2572]: E0209 07:05:15.280329 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:15.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.362692 kernel: audit: type=1400 audit(1707462315.232:1100): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.362736 kernel: audit: type=1400 audit(1707462315.232:1101): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.362753 kernel: audit: type=1400 audit(1707462315.232:1102): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.491199 kernel: audit: type=1400 audit(1707462315.232:1103): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.491259 kernel: audit: type=1400 audit(1707462315.232:1104): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.555562 kernel: audit: type=1400 audit(1707462315.232:1105): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.620002 kernel: audit: type=1400 audit(1707462315.232:1106): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.684412 kernel: audit: type=1400 audit(1707462315.232:1107): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit: BPF prog-id=132 op=LOAD Feb 9 07:05:15.361000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit[3271]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3090 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:15.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626662356262663962626436383462383466303339663438393265 Feb 9 07:05:15.361000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit[3271]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3090 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:15.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626662356262663962626436383462383466303339663438393265 Feb 9 07:05:15.361000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.361000 audit: BPF prog-id=133 op=LOAD Feb 9 07:05:15.361000 audit[3271]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003313f0 items=0 ppid=3090 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:15.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626662356262663962626436383462383466303339663438393265 Feb 9 07:05:15.489000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.489000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.489000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.489000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.489000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.489000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.489000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.489000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.489000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.489000 audit: BPF prog-id=134 op=LOAD Feb 9 07:05:15.489000 audit[3271]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000331438 items=0 ppid=3090 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:15.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626662356262663962626436383462383466303339663438393265 Feb 9 07:05:15.618000 audit: BPF prog-id=134 op=UNLOAD Feb 9 07:05:15.618000 audit: BPF prog-id=133 op=UNLOAD Feb 9 07:05:15.618000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.618000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.618000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.618000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.618000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.618000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.618000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.618000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.618000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.618000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:15.618000 audit: BPF prog-id=135 op=LOAD Feb 9 07:05:15.618000 audit[3271]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000331848 items=0 ppid=3090 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:15.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626662356262663962626436383462383466303339663438393265 Feb 9 07:05:15.785945 env[1474]: time="2024-02-09T07:05:15.785866774Z" level=info msg="StartContainer for \"a5bfb5bbf9bbd684b84f039f4892ec749ad43b8f4bde6aa5a05bdb3b19f8f9a4\" returns successfully" Feb 9 07:05:16.456401 kubelet[2572]: I0209 07:05:16.456338 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-856b954977-zww5m" podStartSLOduration=2.283683693 podCreationTimestamp="2024-02-09 07:04:43 +0000 UTC" firstStartedPulling="2024-02-09 07:04:44.018488399 +0000 UTC m=+19.794938966" lastFinishedPulling="2024-02-09 07:05:15.191016055 +0000 UTC m=+50.967466626" observedRunningTime="2024-02-09 07:05:16.454860624 +0000 UTC m=+52.231311272" watchObservedRunningTime="2024-02-09 07:05:16.456211353 +0000 UTC m=+52.232661977" Feb 9 07:05:16.491000 audit[3315]: NETFILTER_CFG table=filter:93 family=2 entries=15 op=nft_register_rule pid=3315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:05:16.491000 audit[3315]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe39b0c960 a2=0 a3=7ffe39b0c94c items=0 ppid=2848 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:16.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:05:16.493000 audit[3315]: NETFILTER_CFG table=nat:94 family=2 entries=19 op=nft_register_chain pid=3315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:05:16.493000 audit[3315]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffe39b0c960 a2=0 a3=7ffe39b0c94c items=0 ppid=2848 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:16.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:05:17.029657 sshd[3259]: Failed password for invalid user luca from 74.121.149.150 port 54274 ssh2 Feb 9 07:05:17.280937 kubelet[2572]: E0209 07:05:17.280784 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:17.353868 sshd[3259]: Received disconnect from 74.121.149.150 port 54274:11: Bye Bye [preauth] Feb 9 07:05:17.353868 sshd[3259]: Disconnected from invalid user luca 74.121.149.150 port 54274 [preauth] Feb 9 07:05:17.356223 systemd[1]: sshd@8-139.178.90.101:22-74.121.149.150:54274.service: Deactivated successfully. Feb 9 07:05:17.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.101:22-74.121.149.150:54274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:05:18.863190 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount110722186.mount: Deactivated successfully. Feb 9 07:05:19.281280 kubelet[2572]: E0209 07:05:19.281184 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:19.874000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:19.903223 kernel: kauditd_printk_skb: 56 callbacks suppressed Feb 9 07:05:19.903293 kernel: audit: type=1400 audit(1707462319.874:1121): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:19.997570 kernel: audit: type=1300 audit(1707462319.874:1121): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017ad2c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:05:19.874000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017ad2c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:05:19.874000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:05:20.214124 kernel: audit: type=1327 audit(1707462319.874:1121): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:05:20.214162 kernel: audit: type=1400 audit(1707462319.874:1122): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:19.874000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:19.874000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001363c60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:05:20.426581 kernel: audit: type=1300 audit(1707462319.874:1122): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001363c60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:05:20.426621 kernel: audit: type=1327 audit(1707462319.874:1122): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:05:19.874000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:05:19.929000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:20.611331 kernel: audit: type=1400 audit(1707462319.929:1123): avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:20.611364 kernel: audit: type=1300 audit(1707462319.929:1123): arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0105ac140 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:05:19.929000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0105ac140 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:05:20.712720 kernel: audit: type=1327 audit(1707462319.929:1123): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:05:19.929000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:05:19.929000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:20.899573 kernel: audit: type=1400 audit(1707462319.929:1124): avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:19.929000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c010d28bd0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:05:19.929000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:05:19.931000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:19.931000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c010d28c30 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:05:19.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:05:19.931000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:19.931000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c007226000 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:05:19.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:05:19.931000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:19.931000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c014546120 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:05:19.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:05:19.931000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:19.931000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0077486f0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:05:19.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:05:21.280251 kubelet[2572]: E0209 07:05:21.280170 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:23.280644 kubelet[2572]: E0209 07:05:23.280539 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:24.022000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:24.022000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017a1640 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:05:24.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:05:24.022000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:24.022000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001255880 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:05:24.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:05:24.022000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:24.022000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c27540 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:05:24.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:05:24.023000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:05:24.023000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0012558a0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:05:24.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:05:25.281163 kubelet[2572]: E0209 07:05:25.281040 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:27.281389 kubelet[2572]: E0209 07:05:27.281281 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:29.280219 kubelet[2572]: E0209 07:05:29.280108 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:31.280375 kubelet[2572]: E0209 07:05:31.280328 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:31.907644 env[1474]: time="2024-02-09T07:05:31.907621576Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:05:31.908245 env[1474]: time="2024-02-09T07:05:31.908204072Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:05:31.909419 env[1474]: time="2024-02-09T07:05:31.909403832Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:05:31.910161 env[1474]: time="2024-02-09T07:05:31.910147869Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:05:31.910593 env[1474]: time="2024-02-09T07:05:31.910561761Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 07:05:31.921753 env[1474]: time="2024-02-09T07:05:31.921718509Z" level=info msg="CreateContainer within sandbox \"24c75908657fc191a0c4edb8c2fcd48a9a92039737f4b1cb052b4b1177f5ab78\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 07:05:31.926500 env[1474]: time="2024-02-09T07:05:31.926457453Z" level=info msg="CreateContainer within sandbox \"24c75908657fc191a0c4edb8c2fcd48a9a92039737f4b1cb052b4b1177f5ab78\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2811f77f04e71b3c7624adf6eeafb8e1dfe5bc4b1708b843d93cd5c3d1ae7a03\"" Feb 9 07:05:31.926876 env[1474]: time="2024-02-09T07:05:31.926844827Z" level=info msg="StartContainer for \"2811f77f04e71b3c7624adf6eeafb8e1dfe5bc4b1708b843d93cd5c3d1ae7a03\"" Feb 9 07:05:31.948480 systemd[1]: Started cri-containerd-2811f77f04e71b3c7624adf6eeafb8e1dfe5bc4b1708b843d93cd5c3d1ae7a03.scope. Feb 9 07:05:31.955000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:31.982737 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 07:05:31.982786 kernel: audit: type=1400 audit(1707462331.955:1133): avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:31.955000 audit[3326]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3112 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:32.142386 kernel: audit: type=1300 audit(1707462331.955:1133): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3112 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:32.142419 kernel: audit: type=1327 audit(1707462331.955:1133): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238313166373766303465373162336337363234616466366565616662 Feb 9 07:05:31.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238313166373766303465373162336337363234616466366565616662 Feb 9 07:05:31.955000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.299262 kernel: audit: type=1400 audit(1707462331.955:1134): avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.299328 kernel: audit: type=1400 audit(1707462331.955:1134): avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:31.955000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:31.955000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.427255 kernel: audit: type=1400 audit(1707462331.955:1134): avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.427287 kernel: audit: type=1400 audit(1707462331.955:1134): avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:31.955000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:31.955000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.506685 env[1474]: time="2024-02-09T07:05:32.506666963Z" level=info msg="StartContainer for \"2811f77f04e71b3c7624adf6eeafb8e1dfe5bc4b1708b843d93cd5c3d1ae7a03\" returns successfully" Feb 9 07:05:32.555279 kernel: audit: type=1400 audit(1707462331.955:1134): avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.555361 kernel: audit: type=1400 audit(1707462331.955:1134): avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:31.955000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.619264 kernel: audit: type=1400 audit(1707462331.955:1134): avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:31.955000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:31.955000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:31.955000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:31.955000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:31.955000 audit: BPF prog-id=136 op=LOAD Feb 9 07:05:31.955000 audit[3326]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000099620 items=0 ppid=3112 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:31.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238313166373766303465373162336337363234616466366565616662 Feb 9 07:05:32.045000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.045000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.045000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.045000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.045000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.045000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.045000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.045000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.045000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.045000 audit: BPF prog-id=137 op=LOAD Feb 9 07:05:32.045000 audit[3326]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000099668 items=0 ppid=3112 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:32.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238313166373766303465373162336337363234616466366565616662 Feb 9 07:05:32.234000 audit: BPF prog-id=137 op=UNLOAD Feb 9 07:05:32.234000 audit: BPF prog-id=136 op=UNLOAD Feb 9 07:05:32.234000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.234000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.234000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.234000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.234000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.234000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.234000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.234000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.234000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.234000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:32.234000 audit: BPF prog-id=138 op=LOAD Feb 9 07:05:32.234000 audit[3326]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000996f8 items=0 ppid=3112 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:32.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238313166373766303465373162336337363234616466366565616662 Feb 9 07:05:33.149519 systemd[1]: cri-containerd-2811f77f04e71b3c7624adf6eeafb8e1dfe5bc4b1708b843d93cd5c3d1ae7a03.scope: Deactivated successfully. Feb 9 07:05:33.160000 audit: BPF prog-id=138 op=UNLOAD Feb 9 07:05:33.187208 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2811f77f04e71b3c7624adf6eeafb8e1dfe5bc4b1708b843d93cd5c3d1ae7a03-rootfs.mount: Deactivated successfully. Feb 9 07:05:33.234156 kubelet[2572]: I0209 07:05:33.234070 2572 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 07:05:33.250844 kubelet[2572]: I0209 07:05:33.250826 2572 topology_manager.go:215] "Topology Admit Handler" podUID="85ed9295-d2d0-4729-a683-fba0fe165b21" podNamespace="kube-system" podName="coredns-5dd5756b68-45pc5" Feb 9 07:05:33.252071 kubelet[2572]: I0209 07:05:33.252058 2572 topology_manager.go:215] "Topology Admit Handler" podUID="8c991773-0782-4064-bd58-f541770467c7" podNamespace="kube-system" podName="coredns-5dd5756b68-hbqln" Feb 9 07:05:33.252321 kubelet[2572]: I0209 07:05:33.252308 2572 topology_manager.go:215] "Topology Admit Handler" podUID="0f78907a-675a-4aa6-800c-2e7afce138e4" podNamespace="calico-system" podName="calico-kube-controllers-6d956c48f-bvr6t" Feb 9 07:05:33.254578 systemd[1]: Created slice kubepods-burstable-pod85ed9295_d2d0_4729_a683_fba0fe165b21.slice. Feb 9 07:05:33.257516 systemd[1]: Created slice kubepods-burstable-pod8c991773_0782_4064_bd58_f541770467c7.slice. Feb 9 07:05:33.259899 systemd[1]: Created slice kubepods-besteffort-pod0f78907a_675a_4aa6_800c_2e7afce138e4.slice. Feb 9 07:05:33.284579 systemd[1]: Created slice kubepods-besteffort-pod90d9a61d_54e4_4233_89c7_8c213472c556.slice. Feb 9 07:05:33.286308 env[1474]: time="2024-02-09T07:05:33.286273676Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zdgpx,Uid:90d9a61d-54e4-4233-89c7-8c213472c556,Namespace:calico-system,Attempt:0,}" Feb 9 07:05:33.352247 kubelet[2572]: I0209 07:05:33.352151 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xnlqf\" (UniqueName: \"kubernetes.io/projected/85ed9295-d2d0-4729-a683-fba0fe165b21-kube-api-access-xnlqf\") pod \"coredns-5dd5756b68-45pc5\" (UID: \"85ed9295-d2d0-4729-a683-fba0fe165b21\") " pod="kube-system/coredns-5dd5756b68-45pc5" Feb 9 07:05:33.352247 kubelet[2572]: I0209 07:05:33.352255 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8c991773-0782-4064-bd58-f541770467c7-config-volume\") pod \"coredns-5dd5756b68-hbqln\" (UID: \"8c991773-0782-4064-bd58-f541770467c7\") " pod="kube-system/coredns-5dd5756b68-hbqln" Feb 9 07:05:33.352789 kubelet[2572]: I0209 07:05:33.352323 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/85ed9295-d2d0-4729-a683-fba0fe165b21-config-volume\") pod \"coredns-5dd5756b68-45pc5\" (UID: \"85ed9295-d2d0-4729-a683-fba0fe165b21\") " pod="kube-system/coredns-5dd5756b68-45pc5" Feb 9 07:05:33.352789 kubelet[2572]: I0209 07:05:33.352534 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bwj5l\" (UniqueName: \"kubernetes.io/projected/8c991773-0782-4064-bd58-f541770467c7-kube-api-access-bwj5l\") pod \"coredns-5dd5756b68-hbqln\" (UID: \"8c991773-0782-4064-bd58-f541770467c7\") " pod="kube-system/coredns-5dd5756b68-hbqln" Feb 9 07:05:33.352789 kubelet[2572]: I0209 07:05:33.352649 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0f78907a-675a-4aa6-800c-2e7afce138e4-tigera-ca-bundle\") pod \"calico-kube-controllers-6d956c48f-bvr6t\" (UID: \"0f78907a-675a-4aa6-800c-2e7afce138e4\") " pod="calico-system/calico-kube-controllers-6d956c48f-bvr6t" Feb 9 07:05:33.352789 kubelet[2572]: I0209 07:05:33.352718 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9vkg2\" (UniqueName: \"kubernetes.io/projected/0f78907a-675a-4aa6-800c-2e7afce138e4-kube-api-access-9vkg2\") pod \"calico-kube-controllers-6d956c48f-bvr6t\" (UID: \"0f78907a-675a-4aa6-800c-2e7afce138e4\") " pod="calico-system/calico-kube-controllers-6d956c48f-bvr6t" Feb 9 07:05:33.557487 env[1474]: time="2024-02-09T07:05:33.557354869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-45pc5,Uid:85ed9295-d2d0-4729-a683-fba0fe165b21,Namespace:kube-system,Attempt:0,}" Feb 9 07:05:33.560104 env[1474]: time="2024-02-09T07:05:33.560032035Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-hbqln,Uid:8c991773-0782-4064-bd58-f541770467c7,Namespace:kube-system,Attempt:0,}" Feb 9 07:05:33.562127 env[1474]: time="2024-02-09T07:05:33.562056778Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6d956c48f-bvr6t,Uid:0f78907a-675a-4aa6-800c-2e7afce138e4,Namespace:calico-system,Attempt:0,}" Feb 9 07:05:33.841096 env[1474]: time="2024-02-09T07:05:33.840885478Z" level=info msg="shim disconnected" id=2811f77f04e71b3c7624adf6eeafb8e1dfe5bc4b1708b843d93cd5c3d1ae7a03 Feb 9 07:05:33.841096 env[1474]: time="2024-02-09T07:05:33.840991189Z" level=warning msg="cleaning up after shim disconnected" id=2811f77f04e71b3c7624adf6eeafb8e1dfe5bc4b1708b843d93cd5c3d1ae7a03 namespace=k8s.io Feb 9 07:05:33.841096 env[1474]: time="2024-02-09T07:05:33.841026097Z" level=info msg="cleaning up dead shim" Feb 9 07:05:33.862464 env[1474]: time="2024-02-09T07:05:33.862432205Z" level=warning msg="cleanup warnings time=\"2024-02-09T07:05:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3389 runtime=io.containerd.runc.v2\n" Feb 9 07:05:33.871117 env[1474]: time="2024-02-09T07:05:33.871064037Z" level=error msg="Failed to destroy network for sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.871302 env[1474]: time="2024-02-09T07:05:33.871280666Z" level=error msg="encountered an error cleaning up failed sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.871365 env[1474]: time="2024-02-09T07:05:33.871314273Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zdgpx,Uid:90d9a61d-54e4-4233-89c7-8c213472c556,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.871529 kubelet[2572]: E0209 07:05:33.871509 2572 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.871599 kubelet[2572]: E0209 07:05:33.871568 2572 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zdgpx" Feb 9 07:05:33.871599 kubelet[2572]: E0209 07:05:33.871590 2572 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zdgpx" Feb 9 07:05:33.871678 kubelet[2572]: E0209 07:05:33.871654 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-zdgpx_calico-system(90d9a61d-54e4-4233-89c7-8c213472c556)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-zdgpx_calico-system(90d9a61d-54e4-4233-89c7-8c213472c556)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:33.877270 env[1474]: time="2024-02-09T07:05:33.877208642Z" level=error msg="Failed to destroy network for sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.877270 env[1474]: time="2024-02-09T07:05:33.877229094Z" level=error msg="Failed to destroy network for sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.877436 env[1474]: time="2024-02-09T07:05:33.877420599Z" level=error msg="encountered an error cleaning up failed sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.877463 env[1474]: time="2024-02-09T07:05:33.877438564Z" level=error msg="encountered an error cleaning up failed sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.877491 env[1474]: time="2024-02-09T07:05:33.877455442Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6d956c48f-bvr6t,Uid:0f78907a-675a-4aa6-800c-2e7afce138e4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.877491 env[1474]: time="2024-02-09T07:05:33.877472872Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-45pc5,Uid:85ed9295-d2d0-4729-a683-fba0fe165b21,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.877662 kubelet[2572]: E0209 07:05:33.877620 2572 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.877662 kubelet[2572]: E0209 07:05:33.877660 2572 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6d956c48f-bvr6t" Feb 9 07:05:33.877733 kubelet[2572]: E0209 07:05:33.877675 2572 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6d956c48f-bvr6t" Feb 9 07:05:33.877733 kubelet[2572]: E0209 07:05:33.877620 2572 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.877733 kubelet[2572]: E0209 07:05:33.877715 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6d956c48f-bvr6t_calico-system(0f78907a-675a-4aa6-800c-2e7afce138e4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6d956c48f-bvr6t_calico-system(0f78907a-675a-4aa6-800c-2e7afce138e4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6d956c48f-bvr6t" podUID="0f78907a-675a-4aa6-800c-2e7afce138e4" Feb 9 07:05:33.877820 kubelet[2572]: E0209 07:05:33.877717 2572 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-45pc5" Feb 9 07:05:33.877820 kubelet[2572]: E0209 07:05:33.877735 2572 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-45pc5" Feb 9 07:05:33.877820 kubelet[2572]: E0209 07:05:33.877767 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-45pc5_kube-system(85ed9295-d2d0-4729-a683-fba0fe165b21)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-45pc5_kube-system(85ed9295-d2d0-4729-a683-fba0fe165b21)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-45pc5" podUID="85ed9295-d2d0-4729-a683-fba0fe165b21" Feb 9 07:05:33.879609 env[1474]: time="2024-02-09T07:05:33.879556985Z" level=error msg="Failed to destroy network for sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.879748 env[1474]: time="2024-02-09T07:05:33.879704670Z" level=error msg="encountered an error cleaning up failed sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.879748 env[1474]: time="2024-02-09T07:05:33.879728327Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-hbqln,Uid:8c991773-0782-4064-bd58-f541770467c7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.879888 kubelet[2572]: E0209 07:05:33.879842 2572 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:33.879888 kubelet[2572]: E0209 07:05:33.879871 2572 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-hbqln" Feb 9 07:05:33.879888 kubelet[2572]: E0209 07:05:33.879888 2572 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-hbqln" Feb 9 07:05:33.879978 kubelet[2572]: E0209 07:05:33.879917 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-hbqln_kube-system(8c991773-0782-4064-bd58-f541770467c7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-hbqln_kube-system(8c991773-0782-4064-bd58-f541770467c7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-hbqln" podUID="8c991773-0782-4064-bd58-f541770467c7" Feb 9 07:05:34.190975 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232-shm.mount: Deactivated successfully. Feb 9 07:05:34.191040 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29-shm.mount: Deactivated successfully. Feb 9 07:05:34.479407 kubelet[2572]: I0209 07:05:34.479240 2572 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:05:34.480133 env[1474]: time="2024-02-09T07:05:34.479427472Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 07:05:34.480637 env[1474]: time="2024-02-09T07:05:34.480548271Z" level=info msg="StopPodSandbox for \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\"" Feb 9 07:05:34.481383 kubelet[2572]: I0209 07:05:34.481332 2572 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:05:34.482597 env[1474]: time="2024-02-09T07:05:34.482514670Z" level=info msg="StopPodSandbox for \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\"" Feb 9 07:05:34.483940 kubelet[2572]: I0209 07:05:34.483895 2572 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:05:34.484577 env[1474]: time="2024-02-09T07:05:34.484561928Z" level=info msg="StopPodSandbox for \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\"" Feb 9 07:05:34.484737 kubelet[2572]: I0209 07:05:34.484729 2572 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:05:34.484951 env[1474]: time="2024-02-09T07:05:34.484935307Z" level=info msg="StopPodSandbox for \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\"" Feb 9 07:05:34.497317 env[1474]: time="2024-02-09T07:05:34.497278161Z" level=error msg="StopPodSandbox for \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\" failed" error="failed to destroy network for sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:34.497443 env[1474]: time="2024-02-09T07:05:34.497391469Z" level=error msg="StopPodSandbox for \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\" failed" error="failed to destroy network for sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:34.497443 env[1474]: time="2024-02-09T07:05:34.497400786Z" level=error msg="StopPodSandbox for \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\" failed" error="failed to destroy network for sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:34.497549 kubelet[2572]: E0209 07:05:34.497467 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:05:34.497549 kubelet[2572]: E0209 07:05:34.497476 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:05:34.497549 kubelet[2572]: E0209 07:05:34.497480 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:05:34.497549 kubelet[2572]: E0209 07:05:34.497534 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29"} Feb 9 07:05:34.497694 kubelet[2572]: E0209 07:05:34.497557 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"90d9a61d-54e4-4233-89c7-8c213472c556\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 07:05:34.497694 kubelet[2572]: E0209 07:05:34.497568 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1"} Feb 9 07:05:34.497694 kubelet[2572]: E0209 07:05:34.497580 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"90d9a61d-54e4-4233-89c7-8c213472c556\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:34.497694 kubelet[2572]: E0209 07:05:34.497587 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232"} Feb 9 07:05:34.497694 kubelet[2572]: E0209 07:05:34.497589 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0f78907a-675a-4aa6-800c-2e7afce138e4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 07:05:34.497921 kubelet[2572]: E0209 07:05:34.497606 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"85ed9295-d2d0-4729-a683-fba0fe165b21\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 07:05:34.497921 kubelet[2572]: E0209 07:05:34.497608 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0f78907a-675a-4aa6-800c-2e7afce138e4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6d956c48f-bvr6t" podUID="0f78907a-675a-4aa6-800c-2e7afce138e4" Feb 9 07:05:34.497921 kubelet[2572]: E0209 07:05:34.497620 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"85ed9295-d2d0-4729-a683-fba0fe165b21\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-45pc5" podUID="85ed9295-d2d0-4729-a683-fba0fe165b21" Feb 9 07:05:34.498392 env[1474]: time="2024-02-09T07:05:34.498374657Z" level=error msg="StopPodSandbox for \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\" failed" error="failed to destroy network for sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:34.498447 kubelet[2572]: E0209 07:05:34.498440 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:05:34.498474 kubelet[2572]: E0209 07:05:34.498452 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e"} Feb 9 07:05:34.498474 kubelet[2572]: E0209 07:05:34.498467 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8c991773-0782-4064-bd58-f541770467c7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 07:05:34.498540 kubelet[2572]: E0209 07:05:34.498480 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8c991773-0782-4064-bd58-f541770467c7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-hbqln" podUID="8c991773-0782-4064-bd58-f541770467c7" Feb 9 07:05:45.281557 env[1474]: time="2024-02-09T07:05:45.281428425Z" level=info msg="StopPodSandbox for \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\"" Feb 9 07:05:45.332034 env[1474]: time="2024-02-09T07:05:45.331973171Z" level=error msg="StopPodSandbox for \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\" failed" error="failed to destroy network for sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:45.332239 kubelet[2572]: E0209 07:05:45.332220 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:05:45.332683 kubelet[2572]: E0209 07:05:45.332286 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e"} Feb 9 07:05:45.332683 kubelet[2572]: E0209 07:05:45.332355 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8c991773-0782-4064-bd58-f541770467c7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 07:05:45.332683 kubelet[2572]: E0209 07:05:45.332406 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8c991773-0782-4064-bd58-f541770467c7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-hbqln" podUID="8c991773-0782-4064-bd58-f541770467c7" Feb 9 07:05:48.159952 systemd[1]: Started sshd@9-139.178.90.101:22-144.91.92.112:43502.service. Feb 9 07:05:48.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.101:22-144.91.92.112:43502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:05:48.186809 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 07:05:48.186881 kernel: audit: type=1130 audit(1707462348.159:1140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.101:22-144.91.92.112:43502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:05:48.280777 env[1474]: time="2024-02-09T07:05:48.280753495Z" level=info msg="StopPodSandbox for \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\"" Feb 9 07:05:48.280990 env[1474]: time="2024-02-09T07:05:48.280817751Z" level=info msg="StopPodSandbox for \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\"" Feb 9 07:05:48.292469 env[1474]: time="2024-02-09T07:05:48.292431107Z" level=error msg="StopPodSandbox for \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\" failed" error="failed to destroy network for sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:48.292635 kubelet[2572]: E0209 07:05:48.292593 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:05:48.292635 kubelet[2572]: E0209 07:05:48.292619 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1"} Feb 9 07:05:48.292828 kubelet[2572]: E0209 07:05:48.292644 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0f78907a-675a-4aa6-800c-2e7afce138e4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 07:05:48.292828 kubelet[2572]: E0209 07:05:48.292662 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0f78907a-675a-4aa6-800c-2e7afce138e4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6d956c48f-bvr6t" podUID="0f78907a-675a-4aa6-800c-2e7afce138e4" Feb 9 07:05:48.292828 kubelet[2572]: E0209 07:05:48.292761 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:05:48.292828 kubelet[2572]: E0209 07:05:48.292776 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232"} Feb 9 07:05:48.292949 env[1474]: time="2024-02-09T07:05:48.292654962Z" level=error msg="StopPodSandbox for \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\" failed" error="failed to destroy network for sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:48.292975 kubelet[2572]: E0209 07:05:48.292794 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"85ed9295-d2d0-4729-a683-fba0fe165b21\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 07:05:48.292975 kubelet[2572]: E0209 07:05:48.292808 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"85ed9295-d2d0-4729-a683-fba0fe165b21\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-45pc5" podUID="85ed9295-d2d0-4729-a683-fba0fe165b21" Feb 9 07:05:49.104769 sshd[3759]: Invalid user system from 144.91.92.112 port 43502 Feb 9 07:05:49.110264 sshd[3759]: pam_faillock(sshd:auth): User unknown Feb 9 07:05:49.111326 sshd[3759]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:05:49.111408 sshd[3759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.92.112 Feb 9 07:05:49.112291 sshd[3759]: pam_faillock(sshd:auth): User unknown Feb 9 07:05:49.111000 audit[3759]: USER_AUTH pid=3759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="system" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:05:49.206570 kernel: audit: type=1100 audit(1707462349.111:1141): pid=3759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="system" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:05:49.281013 env[1474]: time="2024-02-09T07:05:49.280953346Z" level=info msg="StopPodSandbox for \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\"" Feb 9 07:05:49.293282 env[1474]: time="2024-02-09T07:05:49.293220382Z" level=error msg="StopPodSandbox for \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\" failed" error="failed to destroy network for sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 07:05:49.293422 kubelet[2572]: E0209 07:05:49.293412 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:05:49.293605 kubelet[2572]: E0209 07:05:49.293440 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29"} Feb 9 07:05:49.293605 kubelet[2572]: E0209 07:05:49.293464 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"90d9a61d-54e4-4233-89c7-8c213472c556\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 07:05:49.293605 kubelet[2572]: E0209 07:05:49.293482 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"90d9a61d-54e4-4233-89c7-8c213472c556\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zdgpx" podUID="90d9a61d-54e4-4233-89c7-8c213472c556" Feb 9 07:05:50.985918 sshd[3759]: Failed password for invalid user system from 144.91.92.112 port 43502 ssh2 Feb 9 07:05:51.354224 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1396396215.mount: Deactivated successfully. Feb 9 07:05:51.376731 env[1474]: time="2024-02-09T07:05:51.376676530Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:05:51.377250 env[1474]: time="2024-02-09T07:05:51.377207768Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:05:51.377802 env[1474]: time="2024-02-09T07:05:51.377762738Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:05:51.378761 env[1474]: time="2024-02-09T07:05:51.378712720Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:05:51.378967 env[1474]: time="2024-02-09T07:05:51.378924529Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 07:05:51.383326 env[1474]: time="2024-02-09T07:05:51.383306313Z" level=info msg="CreateContainer within sandbox \"24c75908657fc191a0c4edb8c2fcd48a9a92039737f4b1cb052b4b1177f5ab78\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 07:05:51.389594 env[1474]: time="2024-02-09T07:05:51.389516431Z" level=info msg="CreateContainer within sandbox \"24c75908657fc191a0c4edb8c2fcd48a9a92039737f4b1cb052b4b1177f5ab78\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2bed928468d6cc83ef451d1c83e73e3ce7532e47cc4b0719ad780b20856b84fd\"" Feb 9 07:05:51.389914 env[1474]: time="2024-02-09T07:05:51.389874966Z" level=info msg="StartContainer for \"2bed928468d6cc83ef451d1c83e73e3ce7532e47cc4b0719ad780b20856b84fd\"" Feb 9 07:05:51.411090 systemd[1]: Started cri-containerd-2bed928468d6cc83ef451d1c83e73e3ce7532e47cc4b0719ad780b20856b84fd.scope. Feb 9 07:05:51.419000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.421907 sshd[3759]: Received disconnect from 144.91.92.112 port 43502:11: Bye Bye [preauth] Feb 9 07:05:51.421907 sshd[3759]: Disconnected from invalid user system 144.91.92.112 port 43502 [preauth] Feb 9 07:05:51.422480 systemd[1]: sshd@9-139.178.90.101:22-144.91.92.112:43502.service: Deactivated successfully. Feb 9 07:05:51.419000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3112 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:51.580862 kernel: audit: type=1400 audit(1707462351.419:1142): avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580902 kernel: audit: type=1300 audit(1707462351.419:1142): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3112 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:51.580919 kernel: audit: type=1327 audit(1707462351.419:1142): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656439323834363864366363383365663435316431633833653733 Feb 9 07:05:51.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656439323834363864366363383365663435316431633833653733 Feb 9 07:05:51.674117 kernel: audit: type=1400 audit(1707462351.419:1143): avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.419000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.737565 kernel: audit: type=1400 audit(1707462351.419:1143): avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.419000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.801036 kernel: audit: type=1400 audit(1707462351.419:1143): avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.419000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.864571 kernel: audit: type=1400 audit(1707462351.419:1143): avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.419000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.419000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.947658 env[1474]: time="2024-02-09T07:05:51.947631326Z" level=info msg="StartContainer for \"2bed928468d6cc83ef451d1c83e73e3ce7532e47cc4b0719ad780b20856b84fd\" returns successfully" Feb 9 07:05:51.992836 kernel: audit: type=1400 audit(1707462351.419:1143): avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.419000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.419000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.419000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.419000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.101:22-144.91.92.112:43502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:05:51.419000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.419000 audit: BPF prog-id=139 op=LOAD Feb 9 07:05:51.419000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027a460 items=0 ppid=3112 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:51.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656439323834363864366363383365663435316431633833653733 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c000197770 a2=78 a3=c00027a4a8 items=0 ppid=3112 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:51.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656439323834363864366363383365663435316431633833653733 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.580000 audit: BPF prog-id=140 op=LOAD Feb 9 07:05:51.580000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=1 items=0 ppid=3112 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:51.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656439323834363864366363383365663435316431633833653733 Feb 9 07:05:51.736000 audit: BPF prog-id=140 op=UNLOAD Feb 9 07:05:51.736000 audit: BPF prog-id=139 op=UNLOAD Feb 9 07:05:51.736000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.736000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.736000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.736000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.736000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.736000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.736000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.736000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.736000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.736000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:51.736000 audit: BPF prog-id=141 op=LOAD Feb 9 07:05:51.736000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027a538 items=0 ppid=3112 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:51.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656439323834363864366363383365663435316431633833653733 Feb 9 07:05:52.076352 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 07:05:52.076390 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 07:05:52.578680 kubelet[2572]: I0209 07:05:52.578584 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-lgdbf" podStartSLOduration=2.206092364 podCreationTimestamp="2024-02-09 07:04:43 +0000 UTC" firstStartedPulling="2024-02-09 07:04:44.006811048 +0000 UTC m=+19.783261615" lastFinishedPulling="2024-02-09 07:05:51.379166236 +0000 UTC m=+87.155616806" observedRunningTime="2024-02-09 07:05:52.577608468 +0000 UTC m=+88.354059142" watchObservedRunningTime="2024-02-09 07:05:52.578447555 +0000 UTC m=+88.354898174" Feb 9 07:05:53.227000 audit[4010]: AVC avc: denied { write } for pid=4010 comm="tee" name="fd" dev="proc" ino=38506 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 07:05:53.254841 kernel: kauditd_printk_skb: 46 callbacks suppressed Feb 9 07:05:53.254917 kernel: audit: type=1400 audit(1707462353.227:1150): avc: denied { write } for pid=4010 comm="tee" name="fd" dev="proc" ino=38506 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 07:05:53.227000 audit[4010]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff92747961 a2=241 a3=1b6 items=1 ppid=3976 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.414817 kernel: audit: type=1300 audit(1707462353.227:1150): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff92747961 a2=241 a3=1b6 items=1 ppid=3976 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.414859 kernel: audit: type=1307 audit(1707462353.227:1150): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 07:05:53.227000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 07:05:53.446345 kernel: audit: type=1302 audit(1707462353.227:1150): item=0 name="/dev/fd/63" inode=39571 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:05:53.227000 audit: PATH item=0 name="/dev/fd/63" inode=39571 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:05:53.510634 kernel: audit: type=1327 audit(1707462353.227:1150): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 07:05:53.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 07:05:53.572012 kernel: audit: type=1400 audit(1707462353.227:1151): avc: denied { write } for pid=4014 comm="tee" name="fd" dev="proc" ino=35835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 07:05:53.227000 audit[4014]: AVC avc: denied { write } for pid=4014 comm="tee" name="fd" dev="proc" ino=35835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 07:05:53.635998 kernel: audit: type=1300 audit(1707462353.227:1151): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec8405972 a2=241 a3=1b6 items=1 ppid=3980 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.227000 audit[4014]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec8405972 a2=241 a3=1b6 items=1 ppid=3980 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.731038 kernel: audit: type=1307 audit(1707462353.227:1151): cwd="/etc/service/enabled/bird/log" Feb 9 07:05:53.227000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 07:05:53.760673 kernel: audit: type=1302 audit(1707462353.227:1151): item=0 name="/dev/fd/63" inode=35832 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:05:53.227000 audit: PATH item=0 name="/dev/fd/63" inode=35832 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:05:53.824341 kernel: audit: type=1327 audit(1707462353.227:1151): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 07:05:53.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 07:05:53.227000 audit[4012]: AVC avc: denied { write } for pid=4012 comm="tee" name="fd" dev="proc" ino=33346 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 07:05:53.227000 audit[4013]: AVC avc: denied { write } for pid=4013 comm="tee" name="fd" dev="proc" ino=39574 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 07:05:53.227000 audit[4013]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd607b0971 a2=241 a3=1b6 items=1 ppid=3979 pid=4013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.227000 audit[4012]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc783a4962 a2=241 a3=1b6 items=1 ppid=3978 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.227000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 07:05:53.227000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 07:05:53.227000 audit: PATH item=0 name="/dev/fd/63" inode=34692 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:05:53.227000 audit: PATH item=0 name="/dev/fd/63" inode=33343 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:05:53.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 07:05:53.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 07:05:53.227000 audit[4019]: AVC avc: denied { write } for pid=4019 comm="tee" name="fd" dev="proc" ino=29631 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 07:05:53.227000 audit[4019]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd78875973 a2=241 a3=1b6 items=1 ppid=3977 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.227000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 07:05:53.227000 audit: PATH item=0 name="/dev/fd/63" inode=36479 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:05:53.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 07:05:53.227000 audit[4020]: AVC avc: denied { write } for pid=4020 comm="tee" name="fd" dev="proc" ino=32553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 07:05:53.227000 audit[4020]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5d936971 a2=241 a3=1b6 items=1 ppid=3975 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.227000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 07:05:53.227000 audit: PATH item=0 name="/dev/fd/63" inode=32550 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:05:53.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 07:05:53.227000 audit[4023]: AVC avc: denied { write } for pid=4023 comm="tee" name="fd" dev="proc" ino=44043 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 07:05:53.227000 audit[4023]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2d85a971 a2=241 a3=1b6 items=1 ppid=3986 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.227000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 07:05:53.227000 audit: PATH item=0 name="/dev/fd/63" inode=36480 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 07:05:53.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit: BPF prog-id=142 op=LOAD Feb 9 07:05:53.886000 audit[4183]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa98692e0 a2=70 a3=7ff3996b8000 items=0 ppid=3990 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 07:05:53.886000 audit: BPF prog-id=142 op=UNLOAD Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit: BPF prog-id=143 op=LOAD Feb 9 07:05:53.886000 audit[4183]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa98692e0 a2=70 a3=6e items=0 ppid=3990 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 07:05:53.886000 audit: BPF prog-id=143 op=UNLOAD Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffa9869290 a2=70 a3=7fffa98692e0 items=0 ppid=3990 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit: BPF prog-id=144 op=LOAD Feb 9 07:05:53.886000 audit[4183]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fffa9869270 a2=70 a3=7fffa98692e0 items=0 ppid=3990 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 07:05:53.886000 audit: BPF prog-id=144 op=UNLOAD Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa9869350 a2=70 a3=0 items=0 ppid=3990 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa9869340 a2=70 a3=0 items=0 ppid=3990 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fffa9869380 a2=70 a3=0 items=0 ppid=3990 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.886000 audit: BPF prog-id=145 op=LOAD Feb 9 07:05:53.886000 audit[4183]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fffa98692a0 a2=70 a3=ffffffff items=0 ppid=3990 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 07:05:53.888000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.888000 audit[4187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdede62aa0 a2=70 a3=fff80800 items=0 ppid=3990 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.888000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 07:05:53.888000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:53.888000 audit[4187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdede62970 a2=70 a3=3 items=0 ppid=3990 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.888000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 07:05:53.899000 audit: BPF prog-id=145 op=UNLOAD Feb 9 07:05:53.924000 audit[4243]: NETFILTER_CFG table=mangle:95 family=2 entries=19 op=nft_register_chain pid=4243 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 07:05:53.924000 audit[4243]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd4bb97b50 a2=0 a3=7ffd4bb97b3c items=0 ppid=3990 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.924000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 07:05:53.926000 audit[4242]: NETFILTER_CFG table=raw:96 family=2 entries=19 op=nft_register_chain pid=4242 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 07:05:53.926000 audit[4242]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fffce19b5a0 a2=0 a3=558620b6e000 items=0 ppid=3990 pid=4242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.926000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 07:05:53.928000 audit[4246]: NETFILTER_CFG table=nat:97 family=2 entries=16 op=nft_register_chain pid=4246 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 07:05:53.928000 audit[4246]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffe7c175cb0 a2=0 a3=556315ba5000 items=0 ppid=3990 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.928000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 07:05:53.928000 audit[4245]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=4245 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 07:05:53.928000 audit[4245]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffff066c920 a2=0 a3=557d0185e000 items=0 ppid=3990 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:53.928000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 07:05:54.304807 systemd-networkd[1321]: vxlan.calico: Link UP Feb 9 07:05:54.304819 systemd-networkd[1321]: vxlan.calico: Gained carrier Feb 9 07:05:55.551761 systemd-networkd[1321]: vxlan.calico: Gained IPv6LL Feb 9 07:05:59.282155 env[1474]: time="2024-02-09T07:05:59.282022667Z" level=info msg="StopPodSandbox for \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\"" Feb 9 07:05:59.374385 env[1474]: 2024-02-09 07:05:59.357 [INFO][4281] k8s.go 578: Cleaning up netns ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:05:59.374385 env[1474]: 2024-02-09 07:05:59.357 [INFO][4281] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" iface="eth0" netns="/var/run/netns/cni-5599560a-1e60-35e2-e72c-d8c71eabb6d0" Feb 9 07:05:59.374385 env[1474]: 2024-02-09 07:05:59.357 [INFO][4281] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" iface="eth0" netns="/var/run/netns/cni-5599560a-1e60-35e2-e72c-d8c71eabb6d0" Feb 9 07:05:59.374385 env[1474]: 2024-02-09 07:05:59.357 [INFO][4281] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" iface="eth0" netns="/var/run/netns/cni-5599560a-1e60-35e2-e72c-d8c71eabb6d0" Feb 9 07:05:59.374385 env[1474]: 2024-02-09 07:05:59.357 [INFO][4281] k8s.go 585: Releasing IP address(es) ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:05:59.374385 env[1474]: 2024-02-09 07:05:59.357 [INFO][4281] utils.go 188: Calico CNI releasing IP address ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:05:59.374385 env[1474]: 2024-02-09 07:05:59.367 [INFO][4297] ipam_plugin.go 415: Releasing address using handleID ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" HandleID="k8s-pod-network.96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:05:59.374385 env[1474]: 2024-02-09 07:05:59.367 [INFO][4297] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:05:59.374385 env[1474]: 2024-02-09 07:05:59.367 [INFO][4297] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:05:59.374385 env[1474]: 2024-02-09 07:05:59.371 [WARNING][4297] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" HandleID="k8s-pod-network.96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:05:59.374385 env[1474]: 2024-02-09 07:05:59.371 [INFO][4297] ipam_plugin.go 443: Releasing address using workloadID ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" HandleID="k8s-pod-network.96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:05:59.374385 env[1474]: 2024-02-09 07:05:59.372 [INFO][4297] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:05:59.374385 env[1474]: 2024-02-09 07:05:59.373 [INFO][4281] k8s.go 591: Teardown processing complete. ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:05:59.374854 env[1474]: time="2024-02-09T07:05:59.374434557Z" level=info msg="TearDown network for sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\" successfully" Feb 9 07:05:59.374854 env[1474]: time="2024-02-09T07:05:59.374455559Z" level=info msg="StopPodSandbox for \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\" returns successfully" Feb 9 07:05:59.374919 env[1474]: time="2024-02-09T07:05:59.374855210Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-hbqln,Uid:8c991773-0782-4064-bd58-f541770467c7,Namespace:kube-system,Attempt:1,}" Feb 9 07:05:59.375802 systemd[1]: run-netns-cni\x2d5599560a\x2d1e60\x2d35e2\x2de72c\x2dd8c71eabb6d0.mount: Deactivated successfully. Feb 9 07:05:59.437297 systemd-networkd[1321]: cali091347da918: Link UP Feb 9 07:05:59.492385 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 07:05:59.492426 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali091347da918: link becomes ready Feb 9 07:05:59.492439 systemd-networkd[1321]: cali091347da918: Gained carrier Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.395 [INFO][4312] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0 coredns-5dd5756b68- kube-system 8c991773-0782-4064-bd58-f541770467c7 813 0 2024-02-09 07:04:37 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-91c0951621 coredns-5dd5756b68-hbqln eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali091347da918 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" Namespace="kube-system" Pod="coredns-5dd5756b68-hbqln" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-" Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.395 [INFO][4312] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" Namespace="kube-system" Pod="coredns-5dd5756b68-hbqln" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.409 [INFO][4332] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" HandleID="k8s-pod-network.b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.415 [INFO][4332] ipam_plugin.go 268: Auto assigning IP ContainerID="b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" HandleID="k8s-pod-network.b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033dcd0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-91c0951621", "pod":"coredns-5dd5756b68-hbqln", "timestamp":"2024-02-09 07:05:59.409595324 +0000 UTC"}, Hostname:"ci-3510.3.2-a-91c0951621", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.415 [INFO][4332] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.415 [INFO][4332] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.415 [INFO][4332] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-91c0951621' Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.417 [INFO][4332] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" host="ci-3510.3.2-a-91c0951621" Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.420 [INFO][4332] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-91c0951621" Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.423 [INFO][4332] ipam.go 489: Trying affinity for 192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.424 [INFO][4332] ipam.go 155: Attempting to load block cidr=192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.426 [INFO][4332] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.426 [INFO][4332] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.7.192/26 handle="k8s-pod-network.b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" host="ci-3510.3.2-a-91c0951621" Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.427 [INFO][4332] ipam.go 1682: Creating new handle: k8s-pod-network.b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051 Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.430 [INFO][4332] ipam.go 1203: Writing block in order to claim IPs block=192.168.7.192/26 handle="k8s-pod-network.b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" host="ci-3510.3.2-a-91c0951621" Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.434 [INFO][4332] ipam.go 1216: Successfully claimed IPs: [192.168.7.193/26] block=192.168.7.192/26 handle="k8s-pod-network.b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" host="ci-3510.3.2-a-91c0951621" Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.434 [INFO][4332] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.7.193/26] handle="k8s-pod-network.b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" host="ci-3510.3.2-a-91c0951621" Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.434 [INFO][4332] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:05:59.499096 env[1474]: 2024-02-09 07:05:59.434 [INFO][4332] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.7.193/26] IPv6=[] ContainerID="b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" HandleID="k8s-pod-network.b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:05:59.499766 env[1474]: 2024-02-09 07:05:59.436 [INFO][4312] k8s.go 385: Populated endpoint ContainerID="b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" Namespace="kube-system" Pod="coredns-5dd5756b68-hbqln" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"8c991773-0782-4064-bd58-f541770467c7", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"", Pod:"coredns-5dd5756b68-hbqln", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali091347da918", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:05:59.499766 env[1474]: 2024-02-09 07:05:59.436 [INFO][4312] k8s.go 386: Calico CNI using IPs: [192.168.7.193/32] ContainerID="b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" Namespace="kube-system" Pod="coredns-5dd5756b68-hbqln" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:05:59.499766 env[1474]: 2024-02-09 07:05:59.436 [INFO][4312] dataplane_linux.go 68: Setting the host side veth name to cali091347da918 ContainerID="b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" Namespace="kube-system" Pod="coredns-5dd5756b68-hbqln" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:05:59.499766 env[1474]: 2024-02-09 07:05:59.492 [INFO][4312] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" Namespace="kube-system" Pod="coredns-5dd5756b68-hbqln" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:05:59.499766 env[1474]: 2024-02-09 07:05:59.492 [INFO][4312] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" Namespace="kube-system" Pod="coredns-5dd5756b68-hbqln" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"8c991773-0782-4064-bd58-f541770467c7", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051", Pod:"coredns-5dd5756b68-hbqln", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali091347da918", MAC:"0a:d8:79:a6:10:ee", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:05:59.499766 env[1474]: 2024-02-09 07:05:59.498 [INFO][4312] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051" Namespace="kube-system" Pod="coredns-5dd5756b68-hbqln" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:05:59.504691 env[1474]: time="2024-02-09T07:05:59.504655286Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 07:05:59.504691 env[1474]: time="2024-02-09T07:05:59.504679348Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 07:05:59.504797 env[1474]: time="2024-02-09T07:05:59.504692947Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 07:05:59.504797 env[1474]: time="2024-02-09T07:05:59.504759719Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051 pid=4376 runtime=io.containerd.runc.v2 Feb 9 07:05:59.503000 audit[4381]: NETFILTER_CFG table=filter:99 family=2 entries=36 op=nft_register_chain pid=4381 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 07:05:59.531228 kernel: kauditd_printk_skb: 108 callbacks suppressed Feb 9 07:05:59.531271 kernel: audit: type=1325 audit(1707462359.503:1175): table=filter:99 family=2 entries=36 op=nft_register_chain pid=4381 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 07:05:59.548259 systemd[1]: Started cri-containerd-b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051.scope. Feb 9 07:05:59.503000 audit[4381]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe1d2bfa20 a2=0 a3=7ffe1d2bfa0c items=0 ppid=3990 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:59.682911 kernel: audit: type=1300 audit(1707462359.503:1175): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe1d2bfa20 a2=0 a3=7ffe1d2bfa0c items=0 ppid=3990 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:59.682965 kernel: audit: type=1327 audit(1707462359.503:1175): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 07:05:59.503000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 07:05:59.742717 kernel: audit: type=1400 audit(1707462359.594:1176): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.865571 kernel: audit: type=1400 audit(1707462359.594:1177): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.865610 kernel: audit: type=1400 audit(1707462359.594:1178): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.989127 kernel: audit: type=1400 audit(1707462359.594:1179): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.989159 kernel: audit: type=1400 audit(1707462359.594:1180): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.051003 kernel: audit: type=1400 audit(1707462359.594:1181): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.112915 kernel: audit: type=1400 audit(1707462359.594:1182): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit: BPF prog-id=146 op=LOAD Feb 9 07:05:59.741000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit[4388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4376 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:59.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235626564666666333164316330643132313439383738643866306263 Feb 9 07:05:59.741000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit[4388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4376 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:59.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235626564666666333164316330643132313439383738643866306263 Feb 9 07:05:59.741000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.741000 audit: BPF prog-id=147 op=LOAD Feb 9 07:05:59.741000 audit[4388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00008e5c0 items=0 ppid=4376 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:59.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235626564666666333164316330643132313439383738643866306263 Feb 9 07:05:59.864000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.864000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.864000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.864000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.864000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.864000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.864000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.864000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.864000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.864000 audit: BPF prog-id=148 op=LOAD Feb 9 07:05:59.864000 audit[4388]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00008e608 items=0 ppid=4376 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:59.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235626564666666333164316330643132313439383738643866306263 Feb 9 07:05:59.987000 audit: BPF prog-id=148 op=UNLOAD Feb 9 07:05:59.987000 audit: BPF prog-id=147 op=UNLOAD Feb 9 07:05:59.987000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.987000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.987000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.987000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.987000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.987000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.987000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.987000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.987000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.987000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:05:59.987000 audit: BPF prog-id=149 op=LOAD Feb 9 07:05:59.987000 audit[4388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00008ea18 items=0 ppid=4376 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:05:59.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235626564666666333164316330643132313439383738643866306263 Feb 9 07:06:00.203215 env[1474]: time="2024-02-09T07:06:00.203168039Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-hbqln,Uid:8c991773-0782-4064-bd58-f541770467c7,Namespace:kube-system,Attempt:1,} returns sandbox id \"b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051\"" Feb 9 07:06:00.204390 env[1474]: time="2024-02-09T07:06:00.204375869Z" level=info msg="CreateContainer within sandbox \"b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 07:06:00.208673 env[1474]: time="2024-02-09T07:06:00.208658644Z" level=info msg="CreateContainer within sandbox \"b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"103fcd5702c40a661a7ae050be7529524a77e4f50f4621068dd861f71c1d5336\"" Feb 9 07:06:00.208820 env[1474]: time="2024-02-09T07:06:00.208807321Z" level=info msg="StartContainer for \"103fcd5702c40a661a7ae050be7529524a77e4f50f4621068dd861f71c1d5336\"" Feb 9 07:06:00.216658 systemd[1]: Started cri-containerd-103fcd5702c40a661a7ae050be7529524a77e4f50f4621068dd861f71c1d5336.scope. Feb 9 07:06:00.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit: BPF prog-id=150 op=LOAD Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4376 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:00.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130336663643537303263343061363631613761653035306265373532 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4376 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:00.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130336663643537303263343061363631613761653035306265373532 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit: BPF prog-id=151 op=LOAD Feb 9 07:06:00.222000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000309200 items=0 ppid=4376 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:00.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130336663643537303263343061363631613761653035306265373532 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit: BPF prog-id=152 op=LOAD Feb 9 07:06:00.222000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000309248 items=0 ppid=4376 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:00.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130336663643537303263343061363631613761653035306265373532 Feb 9 07:06:00.222000 audit: BPF prog-id=152 op=UNLOAD Feb 9 07:06:00.222000 audit: BPF prog-id=151 op=UNLOAD Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:00.222000 audit: BPF prog-id=153 op=LOAD Feb 9 07:06:00.222000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000309658 items=0 ppid=4376 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:00.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130336663643537303263343061363631613761653035306265373532 Feb 9 07:06:00.244505 env[1474]: time="2024-02-09T07:06:00.244435197Z" level=info msg="StartContainer for \"103fcd5702c40a661a7ae050be7529524a77e4f50f4621068dd861f71c1d5336\" returns successfully" Feb 9 07:06:00.595110 kubelet[2572]: I0209 07:06:00.595043 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-hbqln" podStartSLOduration=83.59493082 podCreationTimestamp="2024-02-09 07:04:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 07:06:00.594054099 +0000 UTC m=+96.370504756" watchObservedRunningTime="2024-02-09 07:06:00.59493082 +0000 UTC m=+96.371381432" Feb 9 07:06:00.615000 audit[4455]: NETFILTER_CFG table=filter:100 family=2 entries=14 op=nft_register_rule pid=4455 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:00.615000 audit[4455]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd55f72150 a2=0 a3=7ffd55f7213c items=0 ppid=2848 pid=4455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:00.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:00.617000 audit[4455]: NETFILTER_CFG table=nat:101 family=2 entries=14 op=nft_register_rule pid=4455 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:00.617000 audit[4455]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffd55f72150 a2=0 a3=31030 items=0 ppid=2848 pid=4455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:00.617000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:00.639000 audit[4457]: NETFILTER_CFG table=filter:102 family=2 entries=11 op=nft_register_rule pid=4457 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:00.639000 audit[4457]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe8e2c96a0 a2=0 a3=7ffe8e2c968c items=0 ppid=2848 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:00.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:00.647000 audit[4457]: NETFILTER_CFG table=nat:103 family=2 entries=35 op=nft_register_chain pid=4457 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:00.647000 audit[4457]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffe8e2c96a0 a2=0 a3=7ffe8e2c968c items=0 ppid=2848 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:00.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:01.281903 env[1474]: time="2024-02-09T07:06:01.281791120Z" level=info msg="StopPodSandbox for \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\"" Feb 9 07:06:01.312686 systemd-networkd[1321]: cali091347da918: Gained IPv6LL Feb 9 07:06:01.338228 env[1474]: 2024-02-09 07:06:01.320 [INFO][4475] k8s.go 578: Cleaning up netns ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:06:01.338228 env[1474]: 2024-02-09 07:06:01.320 [INFO][4475] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" iface="eth0" netns="/var/run/netns/cni-ecdad68d-620b-e758-aa6c-713a579e49ed" Feb 9 07:06:01.338228 env[1474]: 2024-02-09 07:06:01.320 [INFO][4475] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" iface="eth0" netns="/var/run/netns/cni-ecdad68d-620b-e758-aa6c-713a579e49ed" Feb 9 07:06:01.338228 env[1474]: 2024-02-09 07:06:01.320 [INFO][4475] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" iface="eth0" netns="/var/run/netns/cni-ecdad68d-620b-e758-aa6c-713a579e49ed" Feb 9 07:06:01.338228 env[1474]: 2024-02-09 07:06:01.320 [INFO][4475] k8s.go 585: Releasing IP address(es) ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:06:01.338228 env[1474]: 2024-02-09 07:06:01.320 [INFO][4475] utils.go 188: Calico CNI releasing IP address ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:06:01.338228 env[1474]: 2024-02-09 07:06:01.331 [INFO][4490] ipam_plugin.go 415: Releasing address using handleID ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" HandleID="k8s-pod-network.b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:01.338228 env[1474]: 2024-02-09 07:06:01.331 [INFO][4490] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:01.338228 env[1474]: 2024-02-09 07:06:01.331 [INFO][4490] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:01.338228 env[1474]: 2024-02-09 07:06:01.335 [WARNING][4490] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" HandleID="k8s-pod-network.b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:01.338228 env[1474]: 2024-02-09 07:06:01.335 [INFO][4490] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" HandleID="k8s-pod-network.b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:01.338228 env[1474]: 2024-02-09 07:06:01.336 [INFO][4490] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:01.338228 env[1474]: 2024-02-09 07:06:01.337 [INFO][4475] k8s.go 591: Teardown processing complete. ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:06:01.338705 env[1474]: time="2024-02-09T07:06:01.338301846Z" level=info msg="TearDown network for sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\" successfully" Feb 9 07:06:01.338705 env[1474]: time="2024-02-09T07:06:01.338325039Z" level=info msg="StopPodSandbox for \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\" returns successfully" Feb 9 07:06:01.338705 env[1474]: time="2024-02-09T07:06:01.338694217Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6d956c48f-bvr6t,Uid:0f78907a-675a-4aa6-800c-2e7afce138e4,Namespace:calico-system,Attempt:1,}" Feb 9 07:06:01.339810 systemd[1]: run-netns-cni\x2decdad68d\x2d620b\x2de758\x2daa6c\x2d713a579e49ed.mount: Deactivated successfully. Feb 9 07:06:01.409793 systemd-networkd[1321]: cali08c9decc240: Link UP Feb 9 07:06:01.464168 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 07:06:01.464211 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali08c9decc240: link becomes ready Feb 9 07:06:01.464304 systemd-networkd[1321]: cali08c9decc240: Gained carrier Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.362 [INFO][4507] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0 calico-kube-controllers-6d956c48f- calico-system 0f78907a-675a-4aa6-800c-2e7afce138e4 832 0 2024-02-09 07:04:43 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6d956c48f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-91c0951621 calico-kube-controllers-6d956c48f-bvr6t eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali08c9decc240 [] []}} ContainerID="8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" Namespace="calico-system" Pod="calico-kube-controllers-6d956c48f-bvr6t" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-" Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.362 [INFO][4507] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" Namespace="calico-system" Pod="calico-kube-controllers-6d956c48f-bvr6t" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.380 [INFO][4527] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" HandleID="k8s-pod-network.8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.387 [INFO][4527] ipam_plugin.go 268: Auto assigning IP ContainerID="8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" HandleID="k8s-pod-network.8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00032b280), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-91c0951621", "pod":"calico-kube-controllers-6d956c48f-bvr6t", "timestamp":"2024-02-09 07:06:01.380097663 +0000 UTC"}, Hostname:"ci-3510.3.2-a-91c0951621", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.387 [INFO][4527] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.387 [INFO][4527] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.387 [INFO][4527] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-91c0951621' Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.389 [INFO][4527] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.392 [INFO][4527] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.395 [INFO][4527] ipam.go 489: Trying affinity for 192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.397 [INFO][4527] ipam.go 155: Attempting to load block cidr=192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.399 [INFO][4527] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.399 [INFO][4527] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.7.192/26 handle="k8s-pod-network.8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.400 [INFO][4527] ipam.go 1682: Creating new handle: k8s-pod-network.8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1 Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.403 [INFO][4527] ipam.go 1203: Writing block in order to claim IPs block=192.168.7.192/26 handle="k8s-pod-network.8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.407 [INFO][4527] ipam.go 1216: Successfully claimed IPs: [192.168.7.194/26] block=192.168.7.192/26 handle="k8s-pod-network.8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.407 [INFO][4527] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.7.194/26] handle="k8s-pod-network.8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.407 [INFO][4527] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:01.470053 env[1474]: 2024-02-09 07:06:01.407 [INFO][4527] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.7.194/26] IPv6=[] ContainerID="8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" HandleID="k8s-pod-network.8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:01.470617 env[1474]: 2024-02-09 07:06:01.408 [INFO][4507] k8s.go 385: Populated endpoint ContainerID="8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" Namespace="calico-system" Pod="calico-kube-controllers-6d956c48f-bvr6t" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0", GenerateName:"calico-kube-controllers-6d956c48f-", Namespace:"calico-system", SelfLink:"", UID:"0f78907a-675a-4aa6-800c-2e7afce138e4", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6d956c48f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"", Pod:"calico-kube-controllers-6d956c48f-bvr6t", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.7.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali08c9decc240", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:01.470617 env[1474]: 2024-02-09 07:06:01.408 [INFO][4507] k8s.go 386: Calico CNI using IPs: [192.168.7.194/32] ContainerID="8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" Namespace="calico-system" Pod="calico-kube-controllers-6d956c48f-bvr6t" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:01.470617 env[1474]: 2024-02-09 07:06:01.408 [INFO][4507] dataplane_linux.go 68: Setting the host side veth name to cali08c9decc240 ContainerID="8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" Namespace="calico-system" Pod="calico-kube-controllers-6d956c48f-bvr6t" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:01.470617 env[1474]: 2024-02-09 07:06:01.464 [INFO][4507] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" Namespace="calico-system" Pod="calico-kube-controllers-6d956c48f-bvr6t" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:01.470617 env[1474]: 2024-02-09 07:06:01.464 [INFO][4507] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" Namespace="calico-system" Pod="calico-kube-controllers-6d956c48f-bvr6t" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0", GenerateName:"calico-kube-controllers-6d956c48f-", Namespace:"calico-system", SelfLink:"", UID:"0f78907a-675a-4aa6-800c-2e7afce138e4", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6d956c48f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1", Pod:"calico-kube-controllers-6d956c48f-bvr6t", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.7.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali08c9decc240", MAC:"76:f6:3e:79:a0:d0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:01.470617 env[1474]: 2024-02-09 07:06:01.468 [INFO][4507] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1" Namespace="calico-system" Pod="calico-kube-controllers-6d956c48f-bvr6t" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:01.475527 env[1474]: time="2024-02-09T07:06:01.475485778Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 07:06:01.475527 env[1474]: time="2024-02-09T07:06:01.475512041Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 07:06:01.475527 env[1474]: time="2024-02-09T07:06:01.475518841Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 07:06:01.475703 env[1474]: time="2024-02-09T07:06:01.475586429Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1 pid=4565 runtime=io.containerd.runc.v2 Feb 9 07:06:01.474000 audit[4571]: NETFILTER_CFG table=filter:104 family=2 entries=40 op=nft_register_chain pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 07:06:01.474000 audit[4571]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffe4c8d5cd0 a2=0 a3=7ffe4c8d5cbc items=0 ppid=3990 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:01.474000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 07:06:01.496816 systemd[1]: Started cri-containerd-8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1.scope. Feb 9 07:06:01.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit: BPF prog-id=154 op=LOAD Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4565 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:01.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393039616439623633363764316166346436653363386561613435 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4565 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:01.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393039616439623633363764316166346436653363386561613435 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit: BPF prog-id=155 op=LOAD Feb 9 07:06:01.500000 audit[4577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000304620 items=0 ppid=4565 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:01.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393039616439623633363764316166346436653363386561613435 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit: BPF prog-id=156 op=LOAD Feb 9 07:06:01.500000 audit[4577]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000304668 items=0 ppid=4565 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:01.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393039616439623633363764316166346436653363386561613435 Feb 9 07:06:01.500000 audit: BPF prog-id=156 op=UNLOAD Feb 9 07:06:01.500000 audit: BPF prog-id=155 op=UNLOAD Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:01.500000 audit: BPF prog-id=157 op=LOAD Feb 9 07:06:01.500000 audit[4577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000304a78 items=0 ppid=4565 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:01.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393039616439623633363764316166346436653363386561613435 Feb 9 07:06:01.531393 env[1474]: time="2024-02-09T07:06:01.531358366Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6d956c48f-bvr6t,Uid:0f78907a-675a-4aa6-800c-2e7afce138e4,Namespace:calico-system,Attempt:1,} returns sandbox id \"8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1\"" Feb 9 07:06:01.532226 env[1474]: time="2024-02-09T07:06:01.532158085Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 07:06:02.281688 env[1474]: time="2024-02-09T07:06:02.281605814Z" level=info msg="StopPodSandbox for \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\"" Feb 9 07:06:02.441533 env[1474]: 2024-02-09 07:06:02.371 [INFO][4620] k8s.go 578: Cleaning up netns ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:06:02.441533 env[1474]: 2024-02-09 07:06:02.371 [INFO][4620] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" iface="eth0" netns="/var/run/netns/cni-0d9ccef0-5295-1115-a01f-471838abda29" Feb 9 07:06:02.441533 env[1474]: 2024-02-09 07:06:02.372 [INFO][4620] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" iface="eth0" netns="/var/run/netns/cni-0d9ccef0-5295-1115-a01f-471838abda29" Feb 9 07:06:02.441533 env[1474]: 2024-02-09 07:06:02.372 [INFO][4620] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" iface="eth0" netns="/var/run/netns/cni-0d9ccef0-5295-1115-a01f-471838abda29" Feb 9 07:06:02.441533 env[1474]: 2024-02-09 07:06:02.372 [INFO][4620] k8s.go 585: Releasing IP address(es) ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:06:02.441533 env[1474]: 2024-02-09 07:06:02.372 [INFO][4620] utils.go 188: Calico CNI releasing IP address ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:06:02.441533 env[1474]: 2024-02-09 07:06:02.417 [INFO][4637] ipam_plugin.go 415: Releasing address using handleID ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" HandleID="k8s-pod-network.f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Workload="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:02.441533 env[1474]: 2024-02-09 07:06:02.417 [INFO][4637] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:02.441533 env[1474]: 2024-02-09 07:06:02.418 [INFO][4637] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:02.441533 env[1474]: 2024-02-09 07:06:02.433 [WARNING][4637] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" HandleID="k8s-pod-network.f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Workload="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:02.441533 env[1474]: 2024-02-09 07:06:02.433 [INFO][4637] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" HandleID="k8s-pod-network.f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Workload="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:02.441533 env[1474]: 2024-02-09 07:06:02.437 [INFO][4637] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:02.441533 env[1474]: 2024-02-09 07:06:02.439 [INFO][4620] k8s.go 591: Teardown processing complete. ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:06:02.444585 env[1474]: time="2024-02-09T07:06:02.441776794Z" level=info msg="TearDown network for sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\" successfully" Feb 9 07:06:02.444585 env[1474]: time="2024-02-09T07:06:02.441844267Z" level=info msg="StopPodSandbox for \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\" returns successfully" Feb 9 07:06:02.444585 env[1474]: time="2024-02-09T07:06:02.443077977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zdgpx,Uid:90d9a61d-54e4-4233-89c7-8c213472c556,Namespace:calico-system,Attempt:1,}" Feb 9 07:06:02.449137 systemd[1]: run-netns-cni\x2d0d9ccef0\x2d5295\x2d1115\x2da01f\x2d471838abda29.mount: Deactivated successfully. Feb 9 07:06:02.529867 systemd-networkd[1321]: cali36df5ebda21: Link UP Feb 9 07:06:02.583431 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 07:06:02.583481 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali36df5ebda21: link becomes ready Feb 9 07:06:02.583514 systemd-networkd[1321]: cali36df5ebda21: Gained carrier Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.492 [INFO][4652] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0 csi-node-driver- calico-system 90d9a61d-54e4-4233-89c7-8c213472c556 838 0 2024-02-09 07:04:43 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-91c0951621 csi-node-driver-zdgpx eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali36df5ebda21 [] []}} ContainerID="dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" Namespace="calico-system" Pod="csi-node-driver-zdgpx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-" Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.492 [INFO][4652] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" Namespace="calico-system" Pod="csi-node-driver-zdgpx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.505 [INFO][4672] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" HandleID="k8s-pod-network.dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" Workload="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.511 [INFO][4672] ipam_plugin.go 268: Auto assigning IP ContainerID="dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" HandleID="k8s-pod-network.dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" Workload="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004969f0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-91c0951621", "pod":"csi-node-driver-zdgpx", "timestamp":"2024-02-09 07:06:02.505423674 +0000 UTC"}, Hostname:"ci-3510.3.2-a-91c0951621", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.511 [INFO][4672] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.511 [INFO][4672] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.511 [INFO][4672] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-91c0951621' Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.513 [INFO][4672] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.515 [INFO][4672] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.518 [INFO][4672] ipam.go 489: Trying affinity for 192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.519 [INFO][4672] ipam.go 155: Attempting to load block cidr=192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.521 [INFO][4672] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.521 [INFO][4672] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.7.192/26 handle="k8s-pod-network.dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.522 [INFO][4672] ipam.go 1682: Creating new handle: k8s-pod-network.dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8 Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.524 [INFO][4672] ipam.go 1203: Writing block in order to claim IPs block=192.168.7.192/26 handle="k8s-pod-network.dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.528 [INFO][4672] ipam.go 1216: Successfully claimed IPs: [192.168.7.195/26] block=192.168.7.192/26 handle="k8s-pod-network.dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.528 [INFO][4672] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.7.195/26] handle="k8s-pod-network.dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.528 [INFO][4672] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:02.589127 env[1474]: 2024-02-09 07:06:02.528 [INFO][4672] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.7.195/26] IPv6=[] ContainerID="dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" HandleID="k8s-pod-network.dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" Workload="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:02.589560 env[1474]: 2024-02-09 07:06:02.529 [INFO][4652] k8s.go 385: Populated endpoint ContainerID="dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" Namespace="calico-system" Pod="csi-node-driver-zdgpx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"90d9a61d-54e4-4233-89c7-8c213472c556", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"", Pod:"csi-node-driver-zdgpx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.7.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali36df5ebda21", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:02.589560 env[1474]: 2024-02-09 07:06:02.529 [INFO][4652] k8s.go 386: Calico CNI using IPs: [192.168.7.195/32] ContainerID="dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" Namespace="calico-system" Pod="csi-node-driver-zdgpx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:02.589560 env[1474]: 2024-02-09 07:06:02.529 [INFO][4652] dataplane_linux.go 68: Setting the host side veth name to cali36df5ebda21 ContainerID="dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" Namespace="calico-system" Pod="csi-node-driver-zdgpx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:02.589560 env[1474]: 2024-02-09 07:06:02.583 [INFO][4652] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" Namespace="calico-system" Pod="csi-node-driver-zdgpx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:02.589560 env[1474]: 2024-02-09 07:06:02.583 [INFO][4652] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" Namespace="calico-system" Pod="csi-node-driver-zdgpx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"90d9a61d-54e4-4233-89c7-8c213472c556", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8", Pod:"csi-node-driver-zdgpx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.7.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali36df5ebda21", MAC:"66:06:de:7e:e9:df", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:02.589560 env[1474]: 2024-02-09 07:06:02.588 [INFO][4652] k8s.go 491: Wrote updated endpoint to datastore ContainerID="dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8" Namespace="calico-system" Pod="csi-node-driver-zdgpx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:02.595162 env[1474]: time="2024-02-09T07:06:02.595100466Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 07:06:02.595162 env[1474]: time="2024-02-09T07:06:02.595121347Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 07:06:02.595162 env[1474]: time="2024-02-09T07:06:02.595128023Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 07:06:02.595286 env[1474]: time="2024-02-09T07:06:02.595187430Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8 pid=4711 runtime=io.containerd.runc.v2 Feb 9 07:06:02.593000 audit[4710]: NETFILTER_CFG table=filter:105 family=2 entries=44 op=nft_register_chain pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 07:06:02.593000 audit[4710]: SYSCALL arch=c000003e syscall=46 success=yes exit=22360 a0=3 a1=7fff17f0a260 a2=0 a3=7fff17f0a24c items=0 ppid=3990 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:02.593000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 07:06:02.614755 systemd[1]: Started cri-containerd-dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8.scope. Feb 9 07:06:02.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.617000 audit: BPF prog-id=158 op=LOAD Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4711 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:02.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383635613633316564663865333762383031303139363563653232 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4711 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:02.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383635613633316564663865333762383031303139363563653232 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit: BPF prog-id=159 op=LOAD Feb 9 07:06:02.618000 audit[4720]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000267600 items=0 ppid=4711 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:02.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383635613633316564663865333762383031303139363563653232 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit: BPF prog-id=160 op=LOAD Feb 9 07:06:02.618000 audit[4720]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000267648 items=0 ppid=4711 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:02.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383635613633316564663865333762383031303139363563653232 Feb 9 07:06:02.618000 audit: BPF prog-id=160 op=UNLOAD Feb 9 07:06:02.618000 audit: BPF prog-id=159 op=UNLOAD Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { perfmon } for pid=4720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit[4720]: AVC avc: denied { bpf } for pid=4720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:02.618000 audit: BPF prog-id=161 op=LOAD Feb 9 07:06:02.618000 audit[4720]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000267a58 items=0 ppid=4711 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:02.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383635613633316564663865333762383031303139363563653232 Feb 9 07:06:02.637709 env[1474]: time="2024-02-09T07:06:02.637658844Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zdgpx,Uid:90d9a61d-54e4-4233-89c7-8c213472c556,Namespace:calico-system,Attempt:1,} returns sandbox id \"dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8\"" Feb 9 07:06:03.281337 env[1474]: time="2024-02-09T07:06:03.281247228Z" level=info msg="StopPodSandbox for \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\"" Feb 9 07:06:03.335280 env[1474]: 2024-02-09 07:06:03.318 [INFO][4761] k8s.go 578: Cleaning up netns ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:06:03.335280 env[1474]: 2024-02-09 07:06:03.318 [INFO][4761] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" iface="eth0" netns="/var/run/netns/cni-95abeb83-30a8-1246-6b92-4fefa8ee655a" Feb 9 07:06:03.335280 env[1474]: 2024-02-09 07:06:03.318 [INFO][4761] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" iface="eth0" netns="/var/run/netns/cni-95abeb83-30a8-1246-6b92-4fefa8ee655a" Feb 9 07:06:03.335280 env[1474]: 2024-02-09 07:06:03.318 [INFO][4761] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" iface="eth0" netns="/var/run/netns/cni-95abeb83-30a8-1246-6b92-4fefa8ee655a" Feb 9 07:06:03.335280 env[1474]: 2024-02-09 07:06:03.319 [INFO][4761] k8s.go 585: Releasing IP address(es) ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:06:03.335280 env[1474]: 2024-02-09 07:06:03.319 [INFO][4761] utils.go 188: Calico CNI releasing IP address ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:06:03.335280 env[1474]: 2024-02-09 07:06:03.328 [INFO][4776] ipam_plugin.go 415: Releasing address using handleID ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" HandleID="k8s-pod-network.764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:03.335280 env[1474]: 2024-02-09 07:06:03.328 [INFO][4776] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:03.335280 env[1474]: 2024-02-09 07:06:03.328 [INFO][4776] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:03.335280 env[1474]: 2024-02-09 07:06:03.332 [WARNING][4776] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" HandleID="k8s-pod-network.764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:03.335280 env[1474]: 2024-02-09 07:06:03.332 [INFO][4776] ipam_plugin.go 443: Releasing address using workloadID ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" HandleID="k8s-pod-network.764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:03.335280 env[1474]: 2024-02-09 07:06:03.334 [INFO][4776] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:03.335280 env[1474]: 2024-02-09 07:06:03.334 [INFO][4761] k8s.go 591: Teardown processing complete. ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:06:03.335744 env[1474]: time="2024-02-09T07:06:03.335349766Z" level=info msg="TearDown network for sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\" successfully" Feb 9 07:06:03.335744 env[1474]: time="2024-02-09T07:06:03.335375331Z" level=info msg="StopPodSandbox for \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\" returns successfully" Feb 9 07:06:03.335868 env[1474]: time="2024-02-09T07:06:03.335811703Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-45pc5,Uid:85ed9295-d2d0-4729-a683-fba0fe165b21,Namespace:kube-system,Attempt:1,}" Feb 9 07:06:03.336954 systemd[1]: run-netns-cni\x2d95abeb83\x2d30a8\x2d1246\x2d6b92\x2d4fefa8ee655a.mount: Deactivated successfully. Feb 9 07:06:03.410684 systemd-networkd[1321]: cali7182c63f378: Link UP Feb 9 07:06:03.438023 systemd-networkd[1321]: cali7182c63f378: Gained carrier Feb 9 07:06:03.438534 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7182c63f378: link becomes ready Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.362 [INFO][4792] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0 coredns-5dd5756b68- kube-system 85ed9295-d2d0-4729-a683-fba0fe165b21 847 0 2024-02-09 07:04:37 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-91c0951621 coredns-5dd5756b68-45pc5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7182c63f378 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" Namespace="kube-system" Pod="coredns-5dd5756b68-45pc5" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-" Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.362 [INFO][4792] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" Namespace="kube-system" Pod="coredns-5dd5756b68-45pc5" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.380 [INFO][4813] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" HandleID="k8s-pod-network.66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.388 [INFO][4813] ipam_plugin.go 268: Auto assigning IP ContainerID="66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" HandleID="k8s-pod-network.66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00071ddd0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-91c0951621", "pod":"coredns-5dd5756b68-45pc5", "timestamp":"2024-02-09 07:06:03.380444577 +0000 UTC"}, Hostname:"ci-3510.3.2-a-91c0951621", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.388 [INFO][4813] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.388 [INFO][4813] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.388 [INFO][4813] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-91c0951621' Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.390 [INFO][4813] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.393 [INFO][4813] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.396 [INFO][4813] ipam.go 489: Trying affinity for 192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.398 [INFO][4813] ipam.go 155: Attempting to load block cidr=192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.400 [INFO][4813] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.400 [INFO][4813] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.7.192/26 handle="k8s-pod-network.66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.401 [INFO][4813] ipam.go 1682: Creating new handle: k8s-pod-network.66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.404 [INFO][4813] ipam.go 1203: Writing block in order to claim IPs block=192.168.7.192/26 handle="k8s-pod-network.66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.408 [INFO][4813] ipam.go 1216: Successfully claimed IPs: [192.168.7.196/26] block=192.168.7.192/26 handle="k8s-pod-network.66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.408 [INFO][4813] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.7.196/26] handle="k8s-pod-network.66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.408 [INFO][4813] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:03.444626 env[1474]: 2024-02-09 07:06:03.408 [INFO][4813] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.7.196/26] IPv6=[] ContainerID="66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" HandleID="k8s-pod-network.66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:03.445505 env[1474]: 2024-02-09 07:06:03.409 [INFO][4792] k8s.go 385: Populated endpoint ContainerID="66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" Namespace="kube-system" Pod="coredns-5dd5756b68-45pc5" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"85ed9295-d2d0-4729-a683-fba0fe165b21", ResourceVersion:"847", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"", Pod:"coredns-5dd5756b68-45pc5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7182c63f378", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:03.445505 env[1474]: 2024-02-09 07:06:03.409 [INFO][4792] k8s.go 386: Calico CNI using IPs: [192.168.7.196/32] ContainerID="66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" Namespace="kube-system" Pod="coredns-5dd5756b68-45pc5" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:03.445505 env[1474]: 2024-02-09 07:06:03.409 [INFO][4792] dataplane_linux.go 68: Setting the host side veth name to cali7182c63f378 ContainerID="66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" Namespace="kube-system" Pod="coredns-5dd5756b68-45pc5" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:03.445505 env[1474]: 2024-02-09 07:06:03.437 [INFO][4792] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" Namespace="kube-system" Pod="coredns-5dd5756b68-45pc5" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:03.445505 env[1474]: 2024-02-09 07:06:03.438 [INFO][4792] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" Namespace="kube-system" Pod="coredns-5dd5756b68-45pc5" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"85ed9295-d2d0-4729-a683-fba0fe165b21", ResourceVersion:"847", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a", Pod:"coredns-5dd5756b68-45pc5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7182c63f378", MAC:"fa:a1:f1:f0:4e:da", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:03.445505 env[1474]: 2024-02-09 07:06:03.443 [INFO][4792] k8s.go 491: Wrote updated endpoint to datastore ContainerID="66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a" Namespace="kube-system" Pod="coredns-5dd5756b68-45pc5" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:03.452608 env[1474]: time="2024-02-09T07:06:03.452539369Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 07:06:03.452608 env[1474]: time="2024-02-09T07:06:03.452571149Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 07:06:03.452608 env[1474]: time="2024-02-09T07:06:03.452581458Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 07:06:03.452768 env[1474]: time="2024-02-09T07:06:03.452679542Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a pid=4850 runtime=io.containerd.runc.v2 Feb 9 07:06:03.451000 audit[4851]: NETFILTER_CFG table=filter:106 family=2 entries=34 op=nft_register_chain pid=4851 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 07:06:03.451000 audit[4851]: SYSCALL arch=c000003e syscall=46 success=yes exit=17884 a0=3 a1=7ffdd9037cd0 a2=0 a3=7ffdd9037cbc items=0 ppid=3990 pid=4851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:03.451000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 07:06:03.472991 systemd[1]: Started cri-containerd-66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a.scope. Feb 9 07:06:03.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.479000 audit: BPF prog-id=162 op=LOAD Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4850 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:03.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636636531383965323336616234343231366237366338666532666335 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=4850 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:03.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636636531383965323336616234343231366237366338666532666335 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit: BPF prog-id=163 op=LOAD Feb 9 07:06:03.480000 audit[4860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0001dab40 items=0 ppid=4850 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:03.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636636531383965323336616234343231366237366338666532666335 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit: BPF prog-id=164 op=LOAD Feb 9 07:06:03.480000 audit[4860]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0001dab88 items=0 ppid=4850 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:03.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636636531383965323336616234343231366237366338666532666335 Feb 9 07:06:03.480000 audit: BPF prog-id=164 op=UNLOAD Feb 9 07:06:03.480000 audit: BPF prog-id=163 op=UNLOAD Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.480000 audit: BPF prog-id=165 op=LOAD Feb 9 07:06:03.480000 audit[4860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0001daf98 items=0 ppid=4850 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:03.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636636531383965323336616234343231366237366338666532666335 Feb 9 07:06:03.487617 systemd-networkd[1321]: cali08c9decc240: Gained IPv6LL Feb 9 07:06:03.516830 env[1474]: time="2024-02-09T07:06:03.516800754Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-45pc5,Uid:85ed9295-d2d0-4729-a683-fba0fe165b21,Namespace:kube-system,Attempt:1,} returns sandbox id \"66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a\"" Feb 9 07:06:03.518410 env[1474]: time="2024-02-09T07:06:03.518390752Z" level=info msg="CreateContainer within sandbox \"66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 07:06:03.523868 env[1474]: time="2024-02-09T07:06:03.523816383Z" level=info msg="CreateContainer within sandbox \"66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f221b790d2b6061bc421dec4a73e2c6ab4ceee3d2d167418eec92b6b5a916337\"" Feb 9 07:06:03.524130 env[1474]: time="2024-02-09T07:06:03.524077677Z" level=info msg="StartContainer for \"f221b790d2b6061bc421dec4a73e2c6ab4ceee3d2d167418eec92b6b5a916337\"" Feb 9 07:06:03.549682 systemd[1]: Started cri-containerd-f221b790d2b6061bc421dec4a73e2c6ab4ceee3d2d167418eec92b6b5a916337.scope. Feb 9 07:06:03.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.556000 audit: BPF prog-id=166 op=LOAD Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4850 pid=4893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:03.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323162373930643262363036316263343231646563346137336532 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4850 pid=4893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:03.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323162373930643262363036316263343231646563346137336532 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit: BPF prog-id=167 op=LOAD Feb 9 07:06:03.557000 audit[4893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001fd2e0 items=0 ppid=4850 pid=4893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:03.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323162373930643262363036316263343231646563346137336532 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit: BPF prog-id=168 op=LOAD Feb 9 07:06:03.557000 audit[4893]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001fd328 items=0 ppid=4850 pid=4893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:03.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323162373930643262363036316263343231646563346137336532 Feb 9 07:06:03.557000 audit: BPF prog-id=168 op=UNLOAD Feb 9 07:06:03.557000 audit: BPF prog-id=167 op=UNLOAD Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { perfmon } for pid=4893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit[4893]: AVC avc: denied { bpf } for pid=4893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:03.557000 audit: BPF prog-id=169 op=LOAD Feb 9 07:06:03.557000 audit[4893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001fd738 items=0 ppid=4850 pid=4893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:03.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323162373930643262363036316263343231646563346137336532 Feb 9 07:06:03.587831 env[1474]: time="2024-02-09T07:06:03.587726464Z" level=info msg="StartContainer for \"f221b790d2b6061bc421dec4a73e2c6ab4ceee3d2d167418eec92b6b5a916337\" returns successfully" Feb 9 07:06:03.871774 systemd-networkd[1321]: cali36df5ebda21: Gained IPv6LL Feb 9 07:06:04.618962 kubelet[2572]: I0209 07:06:04.618893 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-45pc5" podStartSLOduration=87.618797844 podCreationTimestamp="2024-02-09 07:04:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 07:06:04.617193367 +0000 UTC m=+100.393644038" watchObservedRunningTime="2024-02-09 07:06:04.618797844 +0000 UTC m=+100.395248459" Feb 9 07:06:04.638000 audit[4942]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:04.672305 kernel: kauditd_printk_skb: 356 callbacks suppressed Feb 9 07:06:04.672412 kernel: audit: type=1325 audit(1707462364.638:1291): table=filter:107 family=2 entries=8 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:04.638000 audit[4942]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffead501c10 a2=0 a3=7ffead501bfc items=0 ppid=2848 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:04.767650 systemd-networkd[1321]: cali7182c63f378: Gained IPv6LL Feb 9 07:06:04.818396 kernel: audit: type=1300 audit(1707462364.638:1291): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffead501c10 a2=0 a3=7ffead501bfc items=0 ppid=2848 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:04.818450 kernel: audit: type=1327 audit(1707462364.638:1291): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:04.638000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:04.642000 audit[4942]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:04.642000 audit[4942]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffead501c10 a2=0 a3=7ffead501bfc items=0 ppid=2848 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:05.024402 kernel: audit: type=1325 audit(1707462364.642:1292): table=nat:108 family=2 entries=44 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:05.024439 kernel: audit: type=1300 audit(1707462364.642:1292): arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffead501c10 a2=0 a3=7ffead501bfc items=0 ppid=2848 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:05.024456 kernel: audit: type=1327 audit(1707462364.642:1292): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:04.642000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:04.879000 audit[4944]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:04.879000 audit[4944]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcc4e65a00 a2=0 a3=7ffcc4e659ec items=0 ppid=2848 pid=4944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:05.229576 kernel: audit: type=1325 audit(1707462364.879:1293): table=filter:109 family=2 entries=8 op=nft_register_rule pid=4944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:05.229617 kernel: audit: type=1300 audit(1707462364.879:1293): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcc4e65a00 a2=0 a3=7ffcc4e659ec items=0 ppid=2848 pid=4944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:05.229640 kernel: audit: type=1327 audit(1707462364.879:1293): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:04.879000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:05.285000 audit[4944]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=4944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:05.285000 audit[4944]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffcc4e65a00 a2=0 a3=7ffcc4e659ec items=0 ppid=2848 pid=4944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:05.285000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:05.345547 kernel: audit: type=1325 audit(1707462365.285:1294): table=nat:110 family=2 entries=56 op=nft_register_chain pid=4944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:12.581526 env[1474]: time="2024-02-09T07:06:12.581480156Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:06:12.582361 env[1474]: time="2024-02-09T07:06:12.582349124Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:06:12.583655 env[1474]: time="2024-02-09T07:06:12.583642953Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:06:12.584622 env[1474]: time="2024-02-09T07:06:12.584609419Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:06:12.585087 env[1474]: time="2024-02-09T07:06:12.585072902Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 07:06:12.585411 env[1474]: time="2024-02-09T07:06:12.585399878Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 07:06:12.589555 env[1474]: time="2024-02-09T07:06:12.589517271Z" level=info msg="CreateContainer within sandbox \"8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 07:06:12.594124 env[1474]: time="2024-02-09T07:06:12.594079546Z" level=info msg="CreateContainer within sandbox \"8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"40d2f3fb12f575e40b2b46712edfb194e9cc59009fcafd639385aa9891b85702\"" Feb 9 07:06:12.594480 env[1474]: time="2024-02-09T07:06:12.594420365Z" level=info msg="StartContainer for \"40d2f3fb12f575e40b2b46712edfb194e9cc59009fcafd639385aa9891b85702\"" Feb 9 07:06:12.615130 systemd[1]: Started cri-containerd-40d2f3fb12f575e40b2b46712edfb194e9cc59009fcafd639385aa9891b85702.scope. Feb 9 07:06:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.648680 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:06:12.648743 kernel: audit: type=1400 audit(1707462372.621:1295): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.770321 kernel: audit: type=1400 audit(1707462372.621:1296): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.770346 kernel: audit: type=1400 audit(1707462372.621:1297): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.831138 kernel: audit: type=1400 audit(1707462372.621:1298): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.892268 kernel: audit: type=1400 audit(1707462372.621:1299): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.953498 kernel: audit: type=1400 audit(1707462372.621:1300): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:13.075995 kernel: audit: type=1400 audit(1707462372.621:1301): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:13.076095 kernel: audit: type=1400 audit(1707462372.621:1302): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:13.138193 kernel: audit: type=1400 audit(1707462372.621:1303): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:13.199545 kernel: audit: type=1400 audit(1707462372.647:1304): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit: BPF prog-id=170 op=LOAD Feb 9 07:06:12.647000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit[4962]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4565 pid=4962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:12.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643266336662313266353735653430623262343637313265646662 Feb 9 07:06:12.647000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit[4962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=4565 pid=4962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:12.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643266336662313266353735653430623262343637313265646662 Feb 9 07:06:12.647000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.647000 audit: BPF prog-id=171 op=LOAD Feb 9 07:06:12.647000 audit[4962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000300b10 items=0 ppid=4565 pid=4962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:12.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643266336662313266353735653430623262343637313265646662 Feb 9 07:06:12.768000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.768000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.768000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.768000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.768000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.768000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.768000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.768000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.768000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.768000 audit: BPF prog-id=172 op=LOAD Feb 9 07:06:12.768000 audit[4962]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000300b58 items=0 ppid=4565 pid=4962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:12.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643266336662313266353735653430623262343637313265646662 Feb 9 07:06:12.890000 audit: BPF prog-id=172 op=UNLOAD Feb 9 07:06:12.890000 audit: BPF prog-id=171 op=UNLOAD Feb 9 07:06:12.890000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.890000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.890000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.890000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.890000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.890000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.890000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.890000 audit[4962]: AVC avc: denied { perfmon } for pid=4962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.890000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.890000 audit[4962]: AVC avc: denied { bpf } for pid=4962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:12.890000 audit: BPF prog-id=173 op=LOAD Feb 9 07:06:12.890000 audit[4962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000300f68 items=0 ppid=4565 pid=4962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:12.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643266336662313266353735653430623262343637313265646662 Feb 9 07:06:13.280947 env[1474]: time="2024-02-09T07:06:13.280894661Z" level=info msg="StartContainer for \"40d2f3fb12f575e40b2b46712edfb194e9cc59009fcafd639385aa9891b85702\" returns successfully" Feb 9 07:06:13.645340 kubelet[2572]: I0209 07:06:13.645266 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6d956c48f-bvr6t" podStartSLOduration=79.591889536 podCreationTimestamp="2024-02-09 07:04:43 +0000 UTC" firstStartedPulling="2024-02-09 07:06:01.532028966 +0000 UTC m=+97.308479539" lastFinishedPulling="2024-02-09 07:06:12.585278809 +0000 UTC m=+108.361729378" observedRunningTime="2024-02-09 07:06:13.64426859 +0000 UTC m=+109.420719237" watchObservedRunningTime="2024-02-09 07:06:13.645139375 +0000 UTC m=+109.421589993" Feb 9 07:06:17.051110 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2373037541.mount: Deactivated successfully. Feb 9 07:06:19.236894 env[1474]: time="2024-02-09T07:06:19.236839285Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:06:19.237496 env[1474]: time="2024-02-09T07:06:19.237453221Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:06:19.238209 env[1474]: time="2024-02-09T07:06:19.238196038Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:06:19.239270 env[1474]: time="2024-02-09T07:06:19.239231080Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:06:19.239470 env[1474]: time="2024-02-09T07:06:19.239425059Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 07:06:19.240212 env[1474]: time="2024-02-09T07:06:19.240197562Z" level=info msg="CreateContainer within sandbox \"dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 07:06:19.245849 env[1474]: time="2024-02-09T07:06:19.245801040Z" level=info msg="CreateContainer within sandbox \"dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9d3ca7618eeb8f75655be641fed72fd9f7b8a045147718b801170c5eab4bf2d3\"" Feb 9 07:06:19.246062 env[1474]: time="2024-02-09T07:06:19.246018078Z" level=info msg="StartContainer for \"9d3ca7618eeb8f75655be641fed72fd9f7b8a045147718b801170c5eab4bf2d3\"" Feb 9 07:06:19.268148 systemd[1]: Started cri-containerd-9d3ca7618eeb8f75655be641fed72fd9f7b8a045147718b801170c5eab4bf2d3.scope. Feb 9 07:06:19.273000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.300822 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 9 07:06:19.300879 kernel: audit: type=1400 audit(1707462379.273:1313): avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.273000 audit[5036]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4711 pid=5036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:19.461087 kernel: audit: type=1300 audit(1707462379.273:1313): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4711 pid=5036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:19.461141 kernel: audit: type=1327 audit(1707462379.273:1313): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964336361373631386565623866373536353562653634316665643732 Feb 9 07:06:19.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964336361373631386565623866373536353562653634316665643732 Feb 9 07:06:19.273000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.618451 kernel: audit: type=1400 audit(1707462379.273:1314): avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.618545 kernel: audit: type=1400 audit(1707462379.273:1314): avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.273000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.273000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.746356 kernel: audit: type=1400 audit(1707462379.273:1314): avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.746434 kernel: audit: type=1400 audit(1707462379.273:1314): avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.273000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.273000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.874594 kernel: audit: type=1400 audit(1707462379.273:1314): avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.874688 kernel: audit: type=1400 audit(1707462379.273:1314): avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.273000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.938757 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 07:06:19.273000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.273000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.273000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.273000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.273000 audit: BPF prog-id=174 op=LOAD Feb 9 07:06:19.273000 audit[5036]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00026e780 items=0 ppid=4711 pid=5036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:19.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964336361373631386565623866373536353562653634316665643732 Feb 9 07:06:19.459000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.459000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.459000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.459000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.459000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.459000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.459000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.459000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.459000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.459000 audit: BPF prog-id=175 op=LOAD Feb 9 07:06:19.459000 audit[5036]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00026e7c8 items=0 ppid=4711 pid=5036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:19.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964336361373631386565623866373536353562653634316665643732 Feb 9 07:06:19.616000 audit: BPF prog-id=175 op=UNLOAD Feb 9 07:06:19.616000 audit: BPF prog-id=174 op=UNLOAD Feb 9 07:06:19.616000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.616000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.616000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.616000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.616000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.616000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.616000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.616000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.616000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.616000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:19.616000 audit: BPF prog-id=176 op=LOAD Feb 9 07:06:19.616000 audit[5036]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00026e858 items=0 ppid=4711 pid=5036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:19.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964336361373631386565623866373536353562653634316665643732 Feb 9 07:06:19.875000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:06:19.875000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:06:19.875000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025de270 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:06:19.875000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001042620 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:06:19.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:06:19.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:06:19.930000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:06:19.930000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c006c961b0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:06:19.930000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:06:19.930000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:06:19.930000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0085c7aa0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:06:19.930000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:06:19.931000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:06:19.931000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c006c96240 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:06:19.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:06:19.931000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:06:19.931000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c013393880 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:06:19.931000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:06:19.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:06:19.931000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c006c962a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:06:19.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:06:19.979341 env[1474]: time="2024-02-09T07:06:19.979286880Z" level=info msg="StartContainer for \"9d3ca7618eeb8f75655be641fed72fd9f7b8a045147718b801170c5eab4bf2d3\" returns successfully" Feb 9 07:06:19.979869 env[1474]: time="2024-02-09T07:06:19.979855380Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 07:06:23.108726 kubelet[2572]: I0209 07:06:23.108697 2572 topology_manager.go:215] "Topology Admit Handler" podUID="208d8236-5758-42e8-9f1d-ce6baa31791f" podNamespace="calico-apiserver" podName="calico-apiserver-5d665684-j27ct" Feb 9 07:06:23.106000 audit[5090]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=5090 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:23.106000 audit[5090]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff49b70490 a2=0 a3=7fff49b7047c items=0 ppid=2848 pid=5090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:23.106000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:23.111168 kubelet[2572]: I0209 07:06:23.111129 2572 topology_manager.go:215] "Topology Admit Handler" podUID="bc4290cc-5a5f-4951-81cb-7546586995b5" podNamespace="calico-apiserver" podName="calico-apiserver-5d665684-dgtnx" Feb 9 07:06:23.113796 systemd[1]: Created slice kubepods-besteffort-pod208d8236_5758_42e8_9f1d_ce6baa31791f.slice. Feb 9 07:06:23.107000 audit[5090]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=5090 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:23.107000 audit[5090]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff49b70490 a2=0 a3=7fff49b7047c items=0 ppid=2848 pid=5090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:23.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:23.116728 systemd[1]: Created slice kubepods-besteffort-podbc4290cc_5a5f_4951_81cb_7546586995b5.slice. Feb 9 07:06:23.118000 audit[5092]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=5092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:23.118000 audit[5092]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffeb34380b0 a2=0 a3=7ffeb343809c items=0 ppid=2848 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:23.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:23.128000 audit[5092]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:06:23.128000 audit[5092]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffeb34380b0 a2=0 a3=7ffeb343809c items=0 ppid=2848 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:23.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:06:23.211081 kubelet[2572]: I0209 07:06:23.211040 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9gtlj\" (UniqueName: \"kubernetes.io/projected/bc4290cc-5a5f-4951-81cb-7546586995b5-kube-api-access-9gtlj\") pod \"calico-apiserver-5d665684-dgtnx\" (UID: \"bc4290cc-5a5f-4951-81cb-7546586995b5\") " pod="calico-apiserver/calico-apiserver-5d665684-dgtnx" Feb 9 07:06:23.211300 kubelet[2572]: I0209 07:06:23.211164 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/bc4290cc-5a5f-4951-81cb-7546586995b5-calico-apiserver-certs\") pod \"calico-apiserver-5d665684-dgtnx\" (UID: \"bc4290cc-5a5f-4951-81cb-7546586995b5\") " pod="calico-apiserver/calico-apiserver-5d665684-dgtnx" Feb 9 07:06:23.211300 kubelet[2572]: I0209 07:06:23.211229 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/208d8236-5758-42e8-9f1d-ce6baa31791f-calico-apiserver-certs\") pod \"calico-apiserver-5d665684-j27ct\" (UID: \"208d8236-5758-42e8-9f1d-ce6baa31791f\") " pod="calico-apiserver/calico-apiserver-5d665684-j27ct" Feb 9 07:06:23.211484 kubelet[2572]: I0209 07:06:23.211326 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vrvjc\" (UniqueName: \"kubernetes.io/projected/208d8236-5758-42e8-9f1d-ce6baa31791f-kube-api-access-vrvjc\") pod \"calico-apiserver-5d665684-j27ct\" (UID: \"208d8236-5758-42e8-9f1d-ce6baa31791f\") " pod="calico-apiserver/calico-apiserver-5d665684-j27ct" Feb 9 07:06:23.312696 kubelet[2572]: E0209 07:06:23.312563 2572 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 07:06:23.312985 kubelet[2572]: E0209 07:06:23.312565 2572 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 07:06:23.312985 kubelet[2572]: E0209 07:06:23.312795 2572 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/bc4290cc-5a5f-4951-81cb-7546586995b5-calico-apiserver-certs podName:bc4290cc-5a5f-4951-81cb-7546586995b5 nodeName:}" failed. No retries permitted until 2024-02-09 07:06:23.812730369 +0000 UTC m=+119.589181026 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/bc4290cc-5a5f-4951-81cb-7546586995b5-calico-apiserver-certs") pod "calico-apiserver-5d665684-dgtnx" (UID: "bc4290cc-5a5f-4951-81cb-7546586995b5") : secret "calico-apiserver-certs" not found Feb 9 07:06:23.312985 kubelet[2572]: E0209 07:06:23.312861 2572 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/208d8236-5758-42e8-9f1d-ce6baa31791f-calico-apiserver-certs podName:208d8236-5758-42e8-9f1d-ce6baa31791f nodeName:}" failed. No retries permitted until 2024-02-09 07:06:23.812820094 +0000 UTC m=+119.589270706 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/208d8236-5758-42e8-9f1d-ce6baa31791f-calico-apiserver-certs") pod "calico-apiserver-5d665684-j27ct" (UID: "208d8236-5758-42e8-9f1d-ce6baa31791f") : secret "calico-apiserver-certs" not found Feb 9 07:06:24.017309 env[1474]: time="2024-02-09T07:06:24.017182555Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d665684-j27ct,Uid:208d8236-5758-42e8-9f1d-ce6baa31791f,Namespace:calico-apiserver,Attempt:0,}" Feb 9 07:06:24.019254 env[1474]: time="2024-02-09T07:06:24.019132293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d665684-dgtnx,Uid:bc4290cc-5a5f-4951-81cb-7546586995b5,Namespace:calico-apiserver,Attempt:0,}" Feb 9 07:06:24.022000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:06:24.022000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017a0b60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:06:24.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:06:24.022000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:06:24.022000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0005046c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:06:24.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:06:24.023000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:06:24.023000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005046e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:06:24.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:06:24.023000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:06:24.023000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017a0b80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:06:24.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:06:24.126843 systemd-networkd[1321]: calie609f47bbbc: Link UP Feb 9 07:06:24.182694 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 07:06:24.182775 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie609f47bbbc: link becomes ready Feb 9 07:06:24.182783 systemd-networkd[1321]: calie609f47bbbc: Gained carrier Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.078 [INFO][5106] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-eth0 calico-apiserver-5d665684- calico-apiserver bc4290cc-5a5f-4951-81cb-7546586995b5 959 0 2024-02-09 07:06:23 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5d665684 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-91c0951621 calico-apiserver-5d665684-dgtnx eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie609f47bbbc [] []}} ContainerID="e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-dgtnx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-" Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.078 [INFO][5106] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-dgtnx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-eth0" Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.096 [INFO][5143] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" HandleID="k8s-pod-network.e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-eth0" Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.105 [INFO][5143] ipam_plugin.go 268: Auto assigning IP ContainerID="e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" HandleID="k8s-pod-network.e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051390), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-91c0951621", "pod":"calico-apiserver-5d665684-dgtnx", "timestamp":"2024-02-09 07:06:24.09638986 +0000 UTC"}, Hostname:"ci-3510.3.2-a-91c0951621", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.105 [INFO][5143] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.105 [INFO][5143] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.105 [INFO][5143] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-91c0951621' Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.106 [INFO][5143] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.110 [INFO][5143] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.113 [INFO][5143] ipam.go 489: Trying affinity for 192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.115 [INFO][5143] ipam.go 155: Attempting to load block cidr=192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.117 [INFO][5143] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.117 [INFO][5143] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.7.192/26 handle="k8s-pod-network.e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.118 [INFO][5143] ipam.go 1682: Creating new handle: k8s-pod-network.e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.121 [INFO][5143] ipam.go 1203: Writing block in order to claim IPs block=192.168.7.192/26 handle="k8s-pod-network.e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.124 [INFO][5143] ipam.go 1216: Successfully claimed IPs: [192.168.7.197/26] block=192.168.7.192/26 handle="k8s-pod-network.e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.124 [INFO][5143] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.7.197/26] handle="k8s-pod-network.e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.124 [INFO][5143] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:24.188161 env[1474]: 2024-02-09 07:06:24.124 [INFO][5143] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.7.197/26] IPv6=[] ContainerID="e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" HandleID="k8s-pod-network.e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-eth0" Feb 9 07:06:24.188694 env[1474]: 2024-02-09 07:06:24.125 [INFO][5106] k8s.go 385: Populated endpoint ContainerID="e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-dgtnx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-eth0", GenerateName:"calico-apiserver-5d665684-", Namespace:"calico-apiserver", SelfLink:"", UID:"bc4290cc-5a5f-4951-81cb-7546586995b5", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 6, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d665684", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"", Pod:"calico-apiserver-5d665684-dgtnx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.7.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie609f47bbbc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:24.188694 env[1474]: 2024-02-09 07:06:24.125 [INFO][5106] k8s.go 386: Calico CNI using IPs: [192.168.7.197/32] ContainerID="e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-dgtnx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-eth0" Feb 9 07:06:24.188694 env[1474]: 2024-02-09 07:06:24.126 [INFO][5106] dataplane_linux.go 68: Setting the host side veth name to calie609f47bbbc ContainerID="e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-dgtnx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-eth0" Feb 9 07:06:24.188694 env[1474]: 2024-02-09 07:06:24.182 [INFO][5106] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-dgtnx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-eth0" Feb 9 07:06:24.188694 env[1474]: 2024-02-09 07:06:24.183 [INFO][5106] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-dgtnx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-eth0", GenerateName:"calico-apiserver-5d665684-", Namespace:"calico-apiserver", SelfLink:"", UID:"bc4290cc-5a5f-4951-81cb-7546586995b5", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 6, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d665684", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f", Pod:"calico-apiserver-5d665684-dgtnx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.7.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie609f47bbbc", MAC:"c6:f0:c9:01:1d:cb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:24.188694 env[1474]: 2024-02-09 07:06:24.187 [INFO][5106] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-dgtnx" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--dgtnx-eth0" Feb 9 07:06:24.188707 systemd-networkd[1321]: caliab73fc2dc8a: Link UP Feb 9 07:06:24.194325 env[1474]: time="2024-02-09T07:06:24.194292504Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 07:06:24.194325 env[1474]: time="2024-02-09T07:06:24.194314354Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 07:06:24.194325 env[1474]: time="2024-02-09T07:06:24.194320919Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 07:06:24.194473 env[1474]: time="2024-02-09T07:06:24.194422408Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f pid=5203 runtime=io.containerd.runc.v2 Feb 9 07:06:24.200000 audit[5219]: NETFILTER_CFG table=filter:115 family=2 entries=55 op=nft_register_chain pid=5219 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 07:06:24.200000 audit[5219]: SYSCALL arch=c000003e syscall=46 success=yes exit=28088 a0=3 a1=7ffcb015efb0 a2=0 a3=7ffcb015ef9c items=0 ppid=3990 pid=5219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:24.200000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 07:06:24.216964 systemd-networkd[1321]: caliab73fc2dc8a: Gained carrier Feb 9 07:06:24.217508 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliab73fc2dc8a: link becomes ready Feb 9 07:06:24.233094 systemd[1]: Started cri-containerd-e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f.scope. Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.081 [INFO][5100] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-eth0 calico-apiserver-5d665684- calico-apiserver 208d8236-5758-42e8-9f1d-ce6baa31791f 957 0 2024-02-09 07:06:23 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5d665684 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-91c0951621 calico-apiserver-5d665684-j27ct eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliab73fc2dc8a [] []}} ContainerID="6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-j27ct" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-" Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.081 [INFO][5100] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-j27ct" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-eth0" Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.098 [INFO][5151] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" HandleID="k8s-pod-network.6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-eth0" Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.106 [INFO][5151] ipam_plugin.go 268: Auto assigning IP ContainerID="6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" HandleID="k8s-pod-network.6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033d520), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-91c0951621", "pod":"calico-apiserver-5d665684-j27ct", "timestamp":"2024-02-09 07:06:24.098802087 +0000 UTC"}, Hostname:"ci-3510.3.2-a-91c0951621", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.106 [INFO][5151] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.124 [INFO][5151] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.124 [INFO][5151] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-91c0951621' Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.126 [INFO][5151] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.129 [INFO][5151] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.133 [INFO][5151] ipam.go 489: Trying affinity for 192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.134 [INFO][5151] ipam.go 155: Attempting to load block cidr=192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.136 [INFO][5151] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.7.192/26 host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.136 [INFO][5151] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.7.192/26 handle="k8s-pod-network.6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.154 [INFO][5151] ipam.go 1682: Creating new handle: k8s-pod-network.6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997 Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.183 [INFO][5151] ipam.go 1203: Writing block in order to claim IPs block=192.168.7.192/26 handle="k8s-pod-network.6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.186 [INFO][5151] ipam.go 1216: Successfully claimed IPs: [192.168.7.198/26] block=192.168.7.192/26 handle="k8s-pod-network.6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.186 [INFO][5151] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.7.198/26] handle="k8s-pod-network.6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" host="ci-3510.3.2-a-91c0951621" Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.186 [INFO][5151] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:24.236714 env[1474]: 2024-02-09 07:06:24.186 [INFO][5151] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.7.198/26] IPv6=[] ContainerID="6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" HandleID="k8s-pod-network.6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-eth0" Feb 9 07:06:24.237416 env[1474]: 2024-02-09 07:06:24.187 [INFO][5100] k8s.go 385: Populated endpoint ContainerID="6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-j27ct" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-eth0", GenerateName:"calico-apiserver-5d665684-", Namespace:"calico-apiserver", SelfLink:"", UID:"208d8236-5758-42e8-9f1d-ce6baa31791f", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 6, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d665684", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"", Pod:"calico-apiserver-5d665684-j27ct", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.7.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliab73fc2dc8a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:24.237416 env[1474]: 2024-02-09 07:06:24.187 [INFO][5100] k8s.go 386: Calico CNI using IPs: [192.168.7.198/32] ContainerID="6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-j27ct" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-eth0" Feb 9 07:06:24.237416 env[1474]: 2024-02-09 07:06:24.188 [INFO][5100] dataplane_linux.go 68: Setting the host side veth name to caliab73fc2dc8a ContainerID="6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-j27ct" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-eth0" Feb 9 07:06:24.237416 env[1474]: 2024-02-09 07:06:24.216 [INFO][5100] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-j27ct" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-eth0" Feb 9 07:06:24.237416 env[1474]: 2024-02-09 07:06:24.231 [INFO][5100] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-j27ct" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-eth0", GenerateName:"calico-apiserver-5d665684-", Namespace:"calico-apiserver", SelfLink:"", UID:"208d8236-5758-42e8-9f1d-ce6baa31791f", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 6, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d665684", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997", Pod:"calico-apiserver-5d665684-j27ct", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.7.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliab73fc2dc8a", MAC:"c6:a4:ae:1b:e5:fe", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:24.237416 env[1474]: 2024-02-09 07:06:24.235 [INFO][5100] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997" Namespace="calico-apiserver" Pod="calico-apiserver-5d665684-j27ct" WorkloadEndpoint="ci--3510.3.2--a--91c0951621-k8s-calico--apiserver--5d665684--j27ct-eth0" Feb 9 07:06:24.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.237000 audit: BPF prog-id=177 op=LOAD Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5203 pid=5213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:24.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535656436376237313430336362343538313135363133323432666562 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=5203 pid=5213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:24.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535656436376237313430336362343538313135363133323432666562 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit: BPF prog-id=178 op=LOAD Feb 9 07:06:24.238000 audit[5213]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c4370 items=0 ppid=5203 pid=5213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:24.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535656436376237313430336362343538313135363133323432666562 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit: BPF prog-id=179 op=LOAD Feb 9 07:06:24.238000 audit[5213]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c43b8 items=0 ppid=5203 pid=5213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:24.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535656436376237313430336362343538313135363133323432666562 Feb 9 07:06:24.238000 audit: BPF prog-id=179 op=UNLOAD Feb 9 07:06:24.238000 audit: BPF prog-id=178 op=UNLOAD Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { perfmon } for pid=5213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit[5213]: AVC avc: denied { bpf } for pid=5213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.238000 audit: BPF prog-id=180 op=LOAD Feb 9 07:06:24.238000 audit[5213]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c47c8 items=0 ppid=5203 pid=5213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:24.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535656436376237313430336362343538313135363133323432666562 Feb 9 07:06:24.242000 audit[5243]: NETFILTER_CFG table=filter:116 family=2 entries=46 op=nft_register_chain pid=5243 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 07:06:24.242000 audit[5243]: SYSCALL arch=c000003e syscall=46 success=yes exit=23292 a0=3 a1=7fffaf704800 a2=0 a3=7fffaf7047ec items=0 ppid=3990 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:24.242000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 07:06:24.254362 env[1474]: time="2024-02-09T07:06:24.254326357Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 07:06:24.254362 env[1474]: time="2024-02-09T07:06:24.254347449Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 07:06:24.254362 env[1474]: time="2024-02-09T07:06:24.254354664Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 07:06:24.254481 env[1474]: time="2024-02-09T07:06:24.254419292Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997 pid=5252 runtime=io.containerd.runc.v2 Feb 9 07:06:24.259948 systemd[1]: Started cri-containerd-6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997.scope. Feb 9 07:06:24.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.264000 audit: BPF prog-id=181 op=LOAD Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5252 pid=5267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:24.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663636464346238386234363536363839343830643764613433326237 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5252 pid=5267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:24.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663636464346238386234363536363839343830643764613433326237 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit: BPF prog-id=182 op=LOAD Feb 9 07:06:24.265000 audit[5267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000308dc0 items=0 ppid=5252 pid=5267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:24.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663636464346238386234363536363839343830643764613433326237 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit: BPF prog-id=183 op=LOAD Feb 9 07:06:24.265000 audit[5267]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308e08 items=0 ppid=5252 pid=5267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:24.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663636464346238386234363536363839343830643764613433326237 Feb 9 07:06:24.265000 audit: BPF prog-id=183 op=UNLOAD Feb 9 07:06:24.265000 audit: BPF prog-id=182 op=UNLOAD Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { perfmon } for pid=5267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit[5267]: AVC avc: denied { bpf } for pid=5267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:06:24.265000 audit: BPF prog-id=184 op=LOAD Feb 9 07:06:24.265000 audit[5267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000309218 items=0 ppid=5252 pid=5267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:06:24.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663636464346238386234363536363839343830643764613433326237 Feb 9 07:06:24.269968 env[1474]: time="2024-02-09T07:06:24.269948015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d665684-dgtnx,Uid:bc4290cc-5a5f-4951-81cb-7546586995b5,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f\"" Feb 9 07:06:24.278913 env[1474]: time="2024-02-09T07:06:24.278893837Z" level=info msg="StopPodSandbox for \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\"" Feb 9 07:06:24.296152 env[1474]: time="2024-02-09T07:06:24.296122232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d665684-j27ct,Uid:208d8236-5758-42e8-9f1d-ce6baa31791f,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997\"" Feb 9 07:06:24.313426 env[1474]: 2024-02-09 07:06:24.297 [WARNING][5305] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"90d9a61d-54e4-4233-89c7-8c213472c556", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8", Pod:"csi-node-driver-zdgpx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.7.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali36df5ebda21", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:24.313426 env[1474]: 2024-02-09 07:06:24.297 [INFO][5305] k8s.go 578: Cleaning up netns ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:06:24.313426 env[1474]: 2024-02-09 07:06:24.297 [INFO][5305] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" iface="eth0" netns="" Feb 9 07:06:24.313426 env[1474]: 2024-02-09 07:06:24.297 [INFO][5305] k8s.go 585: Releasing IP address(es) ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:06:24.313426 env[1474]: 2024-02-09 07:06:24.297 [INFO][5305] utils.go 188: Calico CNI releasing IP address ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:06:24.313426 env[1474]: 2024-02-09 07:06:24.306 [INFO][5324] ipam_plugin.go 415: Releasing address using handleID ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" HandleID="k8s-pod-network.f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Workload="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:24.313426 env[1474]: 2024-02-09 07:06:24.306 [INFO][5324] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:24.313426 env[1474]: 2024-02-09 07:06:24.306 [INFO][5324] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:24.313426 env[1474]: 2024-02-09 07:06:24.310 [WARNING][5324] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" HandleID="k8s-pod-network.f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Workload="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:24.313426 env[1474]: 2024-02-09 07:06:24.310 [INFO][5324] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" HandleID="k8s-pod-network.f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Workload="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:24.313426 env[1474]: 2024-02-09 07:06:24.312 [INFO][5324] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:24.313426 env[1474]: 2024-02-09 07:06:24.312 [INFO][5305] k8s.go 591: Teardown processing complete. ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:06:24.313777 env[1474]: time="2024-02-09T07:06:24.313442010Z" level=info msg="TearDown network for sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\" successfully" Feb 9 07:06:24.313777 env[1474]: time="2024-02-09T07:06:24.313466239Z" level=info msg="StopPodSandbox for \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\" returns successfully" Feb 9 07:06:24.313777 env[1474]: time="2024-02-09T07:06:24.313768728Z" level=info msg="RemovePodSandbox for \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\"" Feb 9 07:06:24.313833 env[1474]: time="2024-02-09T07:06:24.313784232Z" level=info msg="Forcibly stopping sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\"" Feb 9 07:06:24.350090 env[1474]: 2024-02-09 07:06:24.331 [WARNING][5351] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"90d9a61d-54e4-4233-89c7-8c213472c556", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8", Pod:"csi-node-driver-zdgpx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.7.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali36df5ebda21", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:24.350090 env[1474]: 2024-02-09 07:06:24.331 [INFO][5351] k8s.go 578: Cleaning up netns ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:06:24.350090 env[1474]: 2024-02-09 07:06:24.331 [INFO][5351] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" iface="eth0" netns="" Feb 9 07:06:24.350090 env[1474]: 2024-02-09 07:06:24.331 [INFO][5351] k8s.go 585: Releasing IP address(es) ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:06:24.350090 env[1474]: 2024-02-09 07:06:24.331 [INFO][5351] utils.go 188: Calico CNI releasing IP address ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:06:24.350090 env[1474]: 2024-02-09 07:06:24.343 [INFO][5368] ipam_plugin.go 415: Releasing address using handleID ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" HandleID="k8s-pod-network.f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Workload="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:24.350090 env[1474]: 2024-02-09 07:06:24.343 [INFO][5368] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:24.350090 env[1474]: 2024-02-09 07:06:24.343 [INFO][5368] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:24.350090 env[1474]: 2024-02-09 07:06:24.347 [WARNING][5368] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" HandleID="k8s-pod-network.f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Workload="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:24.350090 env[1474]: 2024-02-09 07:06:24.347 [INFO][5368] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" HandleID="k8s-pod-network.f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Workload="ci--3510.3.2--a--91c0951621-k8s-csi--node--driver--zdgpx-eth0" Feb 9 07:06:24.350090 env[1474]: 2024-02-09 07:06:24.348 [INFO][5368] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:24.350090 env[1474]: 2024-02-09 07:06:24.349 [INFO][5351] k8s.go 591: Teardown processing complete. ContainerID="f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29" Feb 9 07:06:24.350398 env[1474]: time="2024-02-09T07:06:24.350106260Z" level=info msg="TearDown network for sandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\" successfully" Feb 9 07:06:24.351546 env[1474]: time="2024-02-09T07:06:24.351534614Z" level=info msg="RemovePodSandbox \"f945fe9c865c59fec93004ba234155e3f4ed592e823220e3e69bb187418cad29\" returns successfully" Feb 9 07:06:24.351849 env[1474]: time="2024-02-09T07:06:24.351837097Z" level=info msg="StopPodSandbox for \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\"" Feb 9 07:06:24.387946 env[1474]: 2024-02-09 07:06:24.370 [WARNING][5393] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"85ed9295-d2d0-4729-a683-fba0fe165b21", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a", Pod:"coredns-5dd5756b68-45pc5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7182c63f378", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:24.387946 env[1474]: 2024-02-09 07:06:24.370 [INFO][5393] k8s.go 578: Cleaning up netns ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:06:24.387946 env[1474]: 2024-02-09 07:06:24.370 [INFO][5393] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" iface="eth0" netns="" Feb 9 07:06:24.387946 env[1474]: 2024-02-09 07:06:24.370 [INFO][5393] k8s.go 585: Releasing IP address(es) ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:06:24.387946 env[1474]: 2024-02-09 07:06:24.370 [INFO][5393] utils.go 188: Calico CNI releasing IP address ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:06:24.387946 env[1474]: 2024-02-09 07:06:24.380 [INFO][5409] ipam_plugin.go 415: Releasing address using handleID ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" HandleID="k8s-pod-network.764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:24.387946 env[1474]: 2024-02-09 07:06:24.380 [INFO][5409] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:24.387946 env[1474]: 2024-02-09 07:06:24.380 [INFO][5409] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:24.387946 env[1474]: 2024-02-09 07:06:24.385 [WARNING][5409] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" HandleID="k8s-pod-network.764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:24.387946 env[1474]: 2024-02-09 07:06:24.385 [INFO][5409] ipam_plugin.go 443: Releasing address using workloadID ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" HandleID="k8s-pod-network.764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:24.387946 env[1474]: 2024-02-09 07:06:24.386 [INFO][5409] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:24.387946 env[1474]: 2024-02-09 07:06:24.387 [INFO][5393] k8s.go 591: Teardown processing complete. ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:06:24.388293 env[1474]: time="2024-02-09T07:06:24.387957337Z" level=info msg="TearDown network for sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\" successfully" Feb 9 07:06:24.388293 env[1474]: time="2024-02-09T07:06:24.387975055Z" level=info msg="StopPodSandbox for \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\" returns successfully" Feb 9 07:06:24.388293 env[1474]: time="2024-02-09T07:06:24.388262967Z" level=info msg="RemovePodSandbox for \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\"" Feb 9 07:06:24.388351 env[1474]: time="2024-02-09T07:06:24.388283367Z" level=info msg="Forcibly stopping sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\"" Feb 9 07:06:24.424694 env[1474]: 2024-02-09 07:06:24.407 [WARNING][5438] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"85ed9295-d2d0-4729-a683-fba0fe165b21", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"66ce189e236ab44216b76c8fe2fc5db87c51e8bbe92e6f164b2e67cd5fdc5c5a", Pod:"coredns-5dd5756b68-45pc5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7182c63f378", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:24.424694 env[1474]: 2024-02-09 07:06:24.407 [INFO][5438] k8s.go 578: Cleaning up netns ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:06:24.424694 env[1474]: 2024-02-09 07:06:24.407 [INFO][5438] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" iface="eth0" netns="" Feb 9 07:06:24.424694 env[1474]: 2024-02-09 07:06:24.407 [INFO][5438] k8s.go 585: Releasing IP address(es) ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:06:24.424694 env[1474]: 2024-02-09 07:06:24.407 [INFO][5438] utils.go 188: Calico CNI releasing IP address ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:06:24.424694 env[1474]: 2024-02-09 07:06:24.417 [INFO][5452] ipam_plugin.go 415: Releasing address using handleID ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" HandleID="k8s-pod-network.764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:24.424694 env[1474]: 2024-02-09 07:06:24.417 [INFO][5452] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:24.424694 env[1474]: 2024-02-09 07:06:24.417 [INFO][5452] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:24.424694 env[1474]: 2024-02-09 07:06:24.422 [WARNING][5452] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" HandleID="k8s-pod-network.764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:24.424694 env[1474]: 2024-02-09 07:06:24.422 [INFO][5452] ipam_plugin.go 443: Releasing address using workloadID ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" HandleID="k8s-pod-network.764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--45pc5-eth0" Feb 9 07:06:24.424694 env[1474]: 2024-02-09 07:06:24.423 [INFO][5452] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:24.424694 env[1474]: 2024-02-09 07:06:24.424 [INFO][5438] k8s.go 591: Teardown processing complete. ContainerID="764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232" Feb 9 07:06:24.425128 env[1474]: time="2024-02-09T07:06:24.424712242Z" level=info msg="TearDown network for sandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\" successfully" Feb 9 07:06:24.426119 env[1474]: time="2024-02-09T07:06:24.426078740Z" level=info msg="RemovePodSandbox \"764f337a56b78c3f58e8dda45fe9edc1f9371ed836a26553f420e506780a2232\" returns successfully" Feb 9 07:06:24.426367 env[1474]: time="2024-02-09T07:06:24.426321094Z" level=info msg="StopPodSandbox for \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\"" Feb 9 07:06:24.469532 env[1474]: 2024-02-09 07:06:24.445 [WARNING][5484] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0", GenerateName:"calico-kube-controllers-6d956c48f-", Namespace:"calico-system", SelfLink:"", UID:"0f78907a-675a-4aa6-800c-2e7afce138e4", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6d956c48f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1", Pod:"calico-kube-controllers-6d956c48f-bvr6t", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.7.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali08c9decc240", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:24.469532 env[1474]: 2024-02-09 07:06:24.445 [INFO][5484] k8s.go 578: Cleaning up netns ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:06:24.469532 env[1474]: 2024-02-09 07:06:24.446 [INFO][5484] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" iface="eth0" netns="" Feb 9 07:06:24.469532 env[1474]: 2024-02-09 07:06:24.446 [INFO][5484] k8s.go 585: Releasing IP address(es) ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:06:24.469532 env[1474]: 2024-02-09 07:06:24.446 [INFO][5484] utils.go 188: Calico CNI releasing IP address ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:06:24.469532 env[1474]: 2024-02-09 07:06:24.460 [INFO][5498] ipam_plugin.go 415: Releasing address using handleID ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" HandleID="k8s-pod-network.b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:24.469532 env[1474]: 2024-02-09 07:06:24.460 [INFO][5498] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:24.469532 env[1474]: 2024-02-09 07:06:24.460 [INFO][5498] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:24.469532 env[1474]: 2024-02-09 07:06:24.466 [WARNING][5498] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" HandleID="k8s-pod-network.b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:24.469532 env[1474]: 2024-02-09 07:06:24.466 [INFO][5498] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" HandleID="k8s-pod-network.b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:24.469532 env[1474]: 2024-02-09 07:06:24.467 [INFO][5498] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:24.469532 env[1474]: 2024-02-09 07:06:24.468 [INFO][5484] k8s.go 591: Teardown processing complete. ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:06:24.470020 env[1474]: time="2024-02-09T07:06:24.469552453Z" level=info msg="TearDown network for sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\" successfully" Feb 9 07:06:24.470020 env[1474]: time="2024-02-09T07:06:24.469577202Z" level=info msg="StopPodSandbox for \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\" returns successfully" Feb 9 07:06:24.470020 env[1474]: time="2024-02-09T07:06:24.469897450Z" level=info msg="RemovePodSandbox for \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\"" Feb 9 07:06:24.470020 env[1474]: time="2024-02-09T07:06:24.469936087Z" level=info msg="Forcibly stopping sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\"" Feb 9 07:06:24.519961 env[1474]: 2024-02-09 07:06:24.496 [WARNING][5533] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0", GenerateName:"calico-kube-controllers-6d956c48f-", Namespace:"calico-system", SelfLink:"", UID:"0f78907a-675a-4aa6-800c-2e7afce138e4", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6d956c48f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"8f909ad9b6367d1af4d6e3c8eaa454ac8dc5bfc2c6911081c570ee74a34159b1", Pod:"calico-kube-controllers-6d956c48f-bvr6t", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.7.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali08c9decc240", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:24.519961 env[1474]: 2024-02-09 07:06:24.496 [INFO][5533] k8s.go 578: Cleaning up netns ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:06:24.519961 env[1474]: 2024-02-09 07:06:24.496 [INFO][5533] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" iface="eth0" netns="" Feb 9 07:06:24.519961 env[1474]: 2024-02-09 07:06:24.496 [INFO][5533] k8s.go 585: Releasing IP address(es) ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:06:24.519961 env[1474]: 2024-02-09 07:06:24.496 [INFO][5533] utils.go 188: Calico CNI releasing IP address ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:06:24.519961 env[1474]: 2024-02-09 07:06:24.511 [INFO][5546] ipam_plugin.go 415: Releasing address using handleID ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" HandleID="k8s-pod-network.b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:24.519961 env[1474]: 2024-02-09 07:06:24.511 [INFO][5546] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:24.519961 env[1474]: 2024-02-09 07:06:24.511 [INFO][5546] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:24.519961 env[1474]: 2024-02-09 07:06:24.516 [WARNING][5546] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" HandleID="k8s-pod-network.b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:24.519961 env[1474]: 2024-02-09 07:06:24.516 [INFO][5546] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" HandleID="k8s-pod-network.b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Workload="ci--3510.3.2--a--91c0951621-k8s-calico--kube--controllers--6d956c48f--bvr6t-eth0" Feb 9 07:06:24.519961 env[1474]: 2024-02-09 07:06:24.518 [INFO][5546] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:24.519961 env[1474]: 2024-02-09 07:06:24.519 [INFO][5533] k8s.go 591: Teardown processing complete. ContainerID="b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1" Feb 9 07:06:24.520424 env[1474]: time="2024-02-09T07:06:24.519960211Z" level=info msg="TearDown network for sandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\" successfully" Feb 9 07:06:24.521857 env[1474]: time="2024-02-09T07:06:24.521835427Z" level=info msg="RemovePodSandbox \"b6f0974fc31f8742eb05a5b6c43775f4fe31d27888ff5a7fddbbc12eb8ef32f1\" returns successfully" Feb 9 07:06:24.522191 env[1474]: time="2024-02-09T07:06:24.522172373Z" level=info msg="StopPodSandbox for \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\"" Feb 9 07:06:24.573432 env[1474]: 2024-02-09 07:06:24.548 [WARNING][5574] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"8c991773-0782-4064-bd58-f541770467c7", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051", Pod:"coredns-5dd5756b68-hbqln", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali091347da918", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:24.573432 env[1474]: 2024-02-09 07:06:24.549 [INFO][5574] k8s.go 578: Cleaning up netns ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:06:24.573432 env[1474]: 2024-02-09 07:06:24.549 [INFO][5574] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" iface="eth0" netns="" Feb 9 07:06:24.573432 env[1474]: 2024-02-09 07:06:24.549 [INFO][5574] k8s.go 585: Releasing IP address(es) ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:06:24.573432 env[1474]: 2024-02-09 07:06:24.549 [INFO][5574] utils.go 188: Calico CNI releasing IP address ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:06:24.573432 env[1474]: 2024-02-09 07:06:24.564 [INFO][5593] ipam_plugin.go 415: Releasing address using handleID ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" HandleID="k8s-pod-network.96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:06:24.573432 env[1474]: 2024-02-09 07:06:24.564 [INFO][5593] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:24.573432 env[1474]: 2024-02-09 07:06:24.564 [INFO][5593] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:24.573432 env[1474]: 2024-02-09 07:06:24.570 [WARNING][5593] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" HandleID="k8s-pod-network.96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:06:24.573432 env[1474]: 2024-02-09 07:06:24.570 [INFO][5593] ipam_plugin.go 443: Releasing address using workloadID ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" HandleID="k8s-pod-network.96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:06:24.573432 env[1474]: 2024-02-09 07:06:24.571 [INFO][5593] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:24.573432 env[1474]: 2024-02-09 07:06:24.572 [INFO][5574] k8s.go 591: Teardown processing complete. ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:06:24.573938 env[1474]: time="2024-02-09T07:06:24.573453060Z" level=info msg="TearDown network for sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\" successfully" Feb 9 07:06:24.573938 env[1474]: time="2024-02-09T07:06:24.573479111Z" level=info msg="StopPodSandbox for \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\" returns successfully" Feb 9 07:06:24.573938 env[1474]: time="2024-02-09T07:06:24.573802762Z" level=info msg="RemovePodSandbox for \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\"" Feb 9 07:06:24.573938 env[1474]: time="2024-02-09T07:06:24.573829080Z" level=info msg="Forcibly stopping sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\"" Feb 9 07:06:24.623867 env[1474]: 2024-02-09 07:06:24.600 [WARNING][5627] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"8c991773-0782-4064-bd58-f541770467c7", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 7, 4, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-91c0951621", ContainerID:"b5bedfff31d1c0d12149878d8f0bcdbb40e6a19ccd912ae74fcddab63ca68051", Pod:"coredns-5dd5756b68-hbqln", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali091347da918", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 07:06:24.623867 env[1474]: 2024-02-09 07:06:24.600 [INFO][5627] k8s.go 578: Cleaning up netns ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:06:24.623867 env[1474]: 2024-02-09 07:06:24.600 [INFO][5627] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" iface="eth0" netns="" Feb 9 07:06:24.623867 env[1474]: 2024-02-09 07:06:24.600 [INFO][5627] k8s.go 585: Releasing IP address(es) ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:06:24.623867 env[1474]: 2024-02-09 07:06:24.600 [INFO][5627] utils.go 188: Calico CNI releasing IP address ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:06:24.623867 env[1474]: 2024-02-09 07:06:24.614 [INFO][5643] ipam_plugin.go 415: Releasing address using handleID ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" HandleID="k8s-pod-network.96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:06:24.623867 env[1474]: 2024-02-09 07:06:24.614 [INFO][5643] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 07:06:24.623867 env[1474]: 2024-02-09 07:06:24.614 [INFO][5643] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 07:06:24.623867 env[1474]: 2024-02-09 07:06:24.620 [WARNING][5643] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" HandleID="k8s-pod-network.96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:06:24.623867 env[1474]: 2024-02-09 07:06:24.620 [INFO][5643] ipam_plugin.go 443: Releasing address using workloadID ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" HandleID="k8s-pod-network.96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Workload="ci--3510.3.2--a--91c0951621-k8s-coredns--5dd5756b68--hbqln-eth0" Feb 9 07:06:24.623867 env[1474]: 2024-02-09 07:06:24.622 [INFO][5643] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 07:06:24.623867 env[1474]: 2024-02-09 07:06:24.622 [INFO][5627] k8s.go 591: Teardown processing complete. ContainerID="96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e" Feb 9 07:06:24.624391 env[1474]: time="2024-02-09T07:06:24.623886975Z" level=info msg="TearDown network for sandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\" successfully" Feb 9 07:06:24.625732 env[1474]: time="2024-02-09T07:06:24.625713181Z" level=info msg="RemovePodSandbox \"96432a9413f3c488d3d53cc120a9594f4d7f464c1add52e7b03ac234ee14870e\" returns successfully" Feb 9 07:06:25.695792 systemd-networkd[1321]: calie609f47bbbc: Gained IPv6LL Feb 9 07:06:26.016854 systemd-networkd[1321]: caliab73fc2dc8a: Gained IPv6LL Feb 9 07:06:52.684416 systemd[1]: Started sshd@10-139.178.90.101:22-144.91.92.112:43558.service. Feb 9 07:06:52.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-144.91.92.112:43558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:06:52.710884 kernel: kauditd_printk_skb: 201 callbacks suppressed Feb 9 07:06:52.710954 kernel: audit: type=1130 audit(1707462412.683:1372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-144.91.92.112:43558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:06:53.615585 sshd[5741]: Invalid user ubuntu from 144.91.92.112 port 43558 Feb 9 07:06:53.621375 sshd[5741]: pam_faillock(sshd:auth): User unknown Feb 9 07:06:53.622305 sshd[5741]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:06:53.622439 sshd[5741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.92.112 Feb 9 07:06:53.623310 sshd[5741]: pam_faillock(sshd:auth): User unknown Feb 9 07:06:53.622000 audit[5741]: USER_AUTH pid=5741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:06:53.713569 kernel: audit: type=1100 audit(1707462413.622:1373): pid=5741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:06:55.617464 sshd[5741]: Failed password for invalid user ubuntu from 144.91.92.112 port 43558 ssh2 Feb 9 07:06:56.046443 sshd[5741]: Received disconnect from 144.91.92.112 port 43558:11: Bye Bye [preauth] Feb 9 07:06:56.046443 sshd[5741]: Disconnected from invalid user ubuntu 144.91.92.112 port 43558 [preauth] Feb 9 07:06:56.048869 systemd[1]: sshd@10-139.178.90.101:22-144.91.92.112:43558.service: Deactivated successfully. Feb 9 07:06:56.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-144.91.92.112:43558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:06:56.137570 kernel: audit: type=1131 audit(1707462416.047:1374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-144.91.92.112:43558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:07:19.876000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:19.876000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ca1410 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:07:20.091171 kernel: audit: type=1400 audit(1707462439.876:1375): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:20.091211 kernel: audit: type=1300 audit(1707462439.876:1375): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ca1410 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:07:20.091228 kernel: audit: type=1327 audit(1707462439.876:1375): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:07:19.876000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:07:20.181649 kernel: audit: type=1400 audit(1707462439.877:1376): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:19.877000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:19.877000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001abb260 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:07:20.386004 kernel: audit: type=1300 audit(1707462439.877:1376): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001abb260 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:07:20.386035 kernel: audit: type=1327 audit(1707462439.877:1376): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:07:19.877000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:07:20.476932 kernel: audit: type=1400 audit(1707462439.932:1377): avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:19.932000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:20.564707 kernel: audit: type=1300 audit(1707462439.932:1377): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00fe101e0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:07:19.932000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00fe101e0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:07:20.660701 kernel: audit: type=1327 audit(1707462439.932:1377): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:07:19.932000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:07:20.751319 kernel: audit: type=1400 audit(1707462439.932:1378): avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:19.932000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:19.932000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c009eb52f0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:07:19.932000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:07:19.933000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:19.933000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00f6c12a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:07:19.933000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:07:19.933000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:19.933000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:19.933000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c009eb5380 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:07:19.933000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:07:19.933000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c007e7e210 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:07:19.933000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:07:19.966000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:19.966000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c007e7e300 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:07:19.966000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:07:24.023000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:24.023000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc1120 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:07:24.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:07:24.024000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:24.024000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012547e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:07:24.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:07:24.025000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:24.025000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001254800 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:07:24.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:07:24.025000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:07:24.025000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bc1140 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:07:24.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:07:49.158695 systemd[1]: Started sshd@11-139.178.90.101:22-74.121.149.150:54392.service. Feb 9 07:07:49.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-74.121.149.150:54392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:07:49.184571 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 07:07:49.184644 kernel: audit: type=1130 audit(1707462469.158:1387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-74.121.149.150:54392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:07:53.552913 sshd[5870]: Invalid user newuser from 74.121.149.150 port 54392 Feb 9 07:07:53.559130 sshd[5870]: pam_faillock(sshd:auth): User unknown Feb 9 07:07:53.560460 sshd[5870]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:07:53.560616 sshd[5870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.121.149.150 Feb 9 07:07:53.561648 sshd[5870]: pam_faillock(sshd:auth): User unknown Feb 9 07:07:53.561000 audit[5870]: USER_AUTH pid=5870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="newuser" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:07:53.656698 kernel: audit: type=1100 audit(1707462473.561:1388): pid=5870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="newuser" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:07:55.123757 sshd[5870]: Failed password for invalid user newuser from 74.121.149.150 port 54392 ssh2 Feb 9 07:07:56.957470 sshd[5870]: Received disconnect from 74.121.149.150 port 54392:11: Bye Bye [preauth] Feb 9 07:07:56.957470 sshd[5870]: Disconnected from invalid user newuser 74.121.149.150 port 54392 [preauth] Feb 9 07:07:56.960224 systemd[1]: sshd@11-139.178.90.101:22-74.121.149.150:54392.service: Deactivated successfully. Feb 9 07:07:56.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-74.121.149.150:54392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:07:57.053690 kernel: audit: type=1131 audit(1707462476.960:1389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-74.121.149.150:54392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:07:58.739807 systemd[1]: Started sshd@12-139.178.90.101:22-144.91.92.112:43608.service. Feb 9 07:07:58.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-144.91.92.112:43608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:07:58.832626 kernel: audit: type=1130 audit(1707462478.739:1390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-144.91.92.112:43608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:07:59.722675 sshd[5905]: Invalid user yz from 144.91.92.112 port 43608 Feb 9 07:07:59.728817 sshd[5905]: pam_faillock(sshd:auth): User unknown Feb 9 07:07:59.729892 sshd[5905]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:07:59.729986 sshd[5905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.92.112 Feb 9 07:07:59.730882 sshd[5905]: pam_faillock(sshd:auth): User unknown Feb 9 07:07:59.730000 audit[5905]: USER_AUTH pid=5905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yz" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:07:59.827568 kernel: audit: type=1100 audit(1707462479.730:1391): pid=5905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yz" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:08:02.115543 sshd[5905]: Failed password for invalid user yz from 144.91.92.112 port 43608 ssh2 Feb 9 07:08:04.467356 sshd[5905]: Received disconnect from 144.91.92.112 port 43608:11: Bye Bye [preauth] Feb 9 07:08:04.467356 sshd[5905]: Disconnected from invalid user yz 144.91.92.112 port 43608 [preauth] Feb 9 07:08:04.470055 systemd[1]: sshd@12-139.178.90.101:22-144.91.92.112:43608.service: Deactivated successfully. Feb 9 07:08:04.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-144.91.92.112:43608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:08:04.563569 kernel: audit: type=1131 audit(1707462484.470:1392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-144.91.92.112:43608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:08:19.876000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:19.876000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b530b0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:08:20.095059 kernel: audit: type=1400 audit(1707462499.876:1393): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:20.095102 kernel: audit: type=1300 audit(1707462499.876:1393): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b530b0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:08:20.095119 kernel: audit: type=1327 audit(1707462499.876:1393): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:08:19.876000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:08:20.188582 kernel: audit: type=1400 audit(1707462499.877:1394): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:19.877000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:20.278826 kernel: audit: type=1300 audit(1707462499.877:1394): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002de7440 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:08:19.877000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002de7440 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:08:20.400232 kernel: audit: type=1327 audit(1707462499.877:1394): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:08:19.877000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:08:20.493842 kernel: audit: type=1400 audit(1707462499.931:1395): avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:19.931000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:20.584214 kernel: audit: type=1300 audit(1707462499.931:1395): arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c013393f60 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:08:19.931000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c013393f60 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:08:19.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:08:20.776757 kernel: audit: type=1327 audit(1707462499.931:1395): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:08:20.776791 kernel: audit: type=1400 audit(1707462499.931:1396): avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:19.931000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:19.931000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c008718180 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:08:19.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:08:19.932000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:19.932000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c003a70ea0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:08:19.932000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:08:19.932000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:19.932000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c003393b60 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:08:19.932000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:08:19.932000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:19.932000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0048fc870 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:08:19.932000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:08:19.965000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:19.965000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0087182a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:08:19.965000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:08:24.023000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:24.023000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001254780 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:08:24.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:08:24.023000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:24.023000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001043bc0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:08:24.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:08:24.024000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:24.024000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001043be0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:08:24.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:08:24.025000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:08:24.025000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002af8000 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:08:24.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:08:54.544808 env[1474]: time="2024-02-09T07:08:54.544753023Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:08:54.545659 env[1474]: time="2024-02-09T07:08:54.545593368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:08:54.546278 env[1474]: time="2024-02-09T07:08:54.546237785Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:08:54.546858 env[1474]: time="2024-02-09T07:08:54.546845939Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:08:54.547150 env[1474]: time="2024-02-09T07:08:54.547088975Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 07:08:54.547436 env[1474]: time="2024-02-09T07:08:54.547408670Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 07:08:54.548291 env[1474]: time="2024-02-09T07:08:54.548256051Z" level=info msg="CreateContainer within sandbox \"dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 07:08:54.552668 env[1474]: time="2024-02-09T07:08:54.552624615Z" level=info msg="CreateContainer within sandbox \"dd865a631edf8e37b80101965ce22dc3992a4c5f8f854357c6a1b7cfe91cd1d8\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"aca44b0988ed968fa7403b9b07182d6c89ea07890dd9cb8d9e48c3c9ef110dfa\"" Feb 9 07:08:54.552945 env[1474]: time="2024-02-09T07:08:54.552909134Z" level=info msg="StartContainer for \"aca44b0988ed968fa7403b9b07182d6c89ea07890dd9cb8d9e48c3c9ef110dfa\"" Feb 9 07:08:54.576663 systemd[1]: Started cri-containerd-aca44b0988ed968fa7403b9b07182d6c89ea07890dd9cb8d9e48c3c9ef110dfa.scope. Feb 9 07:08:54.581000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.610654 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 07:08:54.610698 kernel: audit: type=1400 audit(1707462534.581:1405): avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.581000 audit[6047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4711 pid=6047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:08:54.771921 kernel: audit: type=1300 audit(1707462534.581:1405): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4711 pid=6047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:08:54.771959 kernel: audit: type=1327 audit(1707462534.581:1405): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163613434623039383865643936386661373430336239623037313832 Feb 9 07:08:54.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163613434623039383865643936386661373430336239623037313832 Feb 9 07:08:54.581000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.865502 kernel: audit: type=1400 audit(1707462534.581:1406): avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.581000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.993843 kernel: audit: type=1400 audit(1707462534.581:1406): avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.993883 kernel: audit: type=1400 audit(1707462534.581:1406): avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.581000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:55.057405 kernel: audit: type=1400 audit(1707462534.581:1406): avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.581000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.581000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:55.185485 kernel: audit: type=1400 audit(1707462534.581:1406): avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:55.185569 kernel: audit: type=1400 audit(1707462534.581:1406): avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.581000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:55.188401 env[1474]: time="2024-02-09T07:08:55.188380570Z" level=info msg="StartContainer for \"aca44b0988ed968fa7403b9b07182d6c89ea07890dd9cb8d9e48c3c9ef110dfa\" returns successfully" Feb 9 07:08:54.581000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:55.313572 kernel: audit: type=1400 audit(1707462534.581:1406): avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.581000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.581000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.581000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.581000 audit: BPF prog-id=185 op=LOAD Feb 9 07:08:54.581000 audit[6047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002769b0 items=0 ppid=4711 pid=6047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:08:54.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163613434623039383865643936386661373430336239623037313832 Feb 9 07:08:54.674000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.674000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.674000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.674000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.674000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.674000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.674000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.674000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.674000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.674000 audit: BPF prog-id=186 op=LOAD Feb 9 07:08:54.674000 audit[6047]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002769f8 items=0 ppid=4711 pid=6047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:08:54.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163613434623039383865643936386661373430336239623037313832 Feb 9 07:08:54.863000 audit: BPF prog-id=186 op=UNLOAD Feb 9 07:08:54.863000 audit: BPF prog-id=185 op=UNLOAD Feb 9 07:08:54.863000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.863000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.863000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.863000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.863000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.863000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.863000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.863000 audit[6047]: AVC avc: denied { perfmon } for pid=6047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.863000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.863000 audit[6047]: AVC avc: denied { bpf } for pid=6047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:08:54.863000 audit: BPF prog-id=187 op=LOAD Feb 9 07:08:54.863000 audit[6047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000276a88 items=0 ppid=4711 pid=6047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:08:54.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163613434623039383865643936386661373430336239623037313832 Feb 9 07:08:55.455614 kubelet[2572]: I0209 07:08:55.455544 2572 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 07:08:55.455614 kubelet[2572]: I0209 07:08:55.455575 2572 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 07:08:56.172540 kubelet[2572]: I0209 07:08:56.172522 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-zdgpx" podStartSLOduration=81.26342237 podCreationTimestamp="2024-02-09 07:04:43 +0000 UTC" firstStartedPulling="2024-02-09 07:06:02.638249676 +0000 UTC m=+98.414700248" lastFinishedPulling="2024-02-09 07:08:54.547315146 +0000 UTC m=+270.323765717" observedRunningTime="2024-02-09 07:08:56.172067111 +0000 UTC m=+271.948517683" watchObservedRunningTime="2024-02-09 07:08:56.172487839 +0000 UTC m=+271.948938409" Feb 9 07:09:06.165123 systemd[1]: Started sshd@13-139.178.90.101:22-144.91.92.112:43656.service. Feb 9 07:09:06.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-144.91.92.112:43656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:09:06.193314 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 07:09:06.193356 kernel: audit: type=1130 audit(1707462546.164:1411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-144.91.92.112:43656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:09:07.151976 sshd[6116]: Invalid user samp from 144.91.92.112 port 43656 Feb 9 07:09:07.158108 sshd[6116]: pam_faillock(sshd:auth): User unknown Feb 9 07:09:07.159363 sshd[6116]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:09:07.159464 sshd[6116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.92.112 Feb 9 07:09:07.160341 sshd[6116]: pam_faillock(sshd:auth): User unknown Feb 9 07:09:07.159000 audit[6116]: USER_AUTH pid=6116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="samp" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:09:07.251564 kernel: audit: type=1100 audit(1707462547.159:1412): pid=6116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="samp" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:09:09.550775 sshd[6116]: Failed password for invalid user samp from 144.91.92.112 port 43656 ssh2 Feb 9 07:09:10.149678 sshd[6116]: Received disconnect from 144.91.92.112 port 43656:11: Bye Bye [preauth] Feb 9 07:09:10.149678 sshd[6116]: Disconnected from invalid user samp 144.91.92.112 port 43656 [preauth] Feb 9 07:09:10.152274 systemd[1]: sshd@13-139.178.90.101:22-144.91.92.112:43656.service: Deactivated successfully. Feb 9 07:09:10.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-144.91.92.112:43656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:09:10.244671 kernel: audit: type=1131 audit(1707462550.151:1413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-144.91.92.112:43656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:09:14.883939 env[1474]: time="2024-02-09T07:09:14.883913347Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:09:14.884463 env[1474]: time="2024-02-09T07:09:14.884452555Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:09:14.885500 env[1474]: time="2024-02-09T07:09:14.885453110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:09:14.886454 env[1474]: time="2024-02-09T07:09:14.886411087Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:09:14.887322 env[1474]: time="2024-02-09T07:09:14.887279835Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 07:09:14.887679 env[1474]: time="2024-02-09T07:09:14.887664864Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 07:09:14.888233 env[1474]: time="2024-02-09T07:09:14.888217050Z" level=info msg="CreateContainer within sandbox \"e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 07:09:14.891977 env[1474]: time="2024-02-09T07:09:14.891931465Z" level=info msg="CreateContainer within sandbox \"e5ed67b71403cb458115613242feb888542a8f1b383b9eca33d76388cc4df56f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"09f93559d72a18f459775479439c94ceb0497416f12a906b2987c5678a311dc7\"" Feb 9 07:09:14.892243 env[1474]: time="2024-02-09T07:09:14.892184999Z" level=info msg="StartContainer for \"09f93559d72a18f459775479439c94ceb0497416f12a906b2987c5678a311dc7\"" Feb 9 07:09:14.917751 systemd[1]: Started cri-containerd-09f93559d72a18f459775479439c94ceb0497416f12a906b2987c5678a311dc7.scope. Feb 9 07:09:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.053559 kernel: audit: type=1400 audit(1707462554.924:1414): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.053597 kernel: audit: type=1400 audit(1707462554.924:1415): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.053614 kernel: audit: type=1400 audit(1707462554.924:1416): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.117229 kernel: audit: type=1400 audit(1707462554.924:1417): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.181198 kernel: audit: type=1400 audit(1707462554.924:1418): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.309281 kernel: audit: type=1400 audit(1707462554.924:1419): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.309313 kernel: audit: type=1400 audit(1707462554.924:1420): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.373462 kernel: audit: type=1400 audit(1707462554.924:1421): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.405369 env[1474]: time="2024-02-09T07:09:15.405314645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:09:15.406093 env[1474]: time="2024-02-09T07:09:15.406052517Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:09:15.406862 env[1474]: time="2024-02-09T07:09:15.406823192Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:09:15.408199 env[1474]: time="2024-02-09T07:09:15.408156414Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 07:09:15.408454 env[1474]: time="2024-02-09T07:09:15.408418319Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 07:09:15.409300 env[1474]: time="2024-02-09T07:09:15.409286489Z" level=info msg="CreateContainer within sandbox \"6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 07:09:15.438145 kernel: audit: type=1400 audit(1707462554.924:1422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.502566 kernel: audit: type=1400 audit(1707462555.052:1423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.503909 env[1474]: time="2024-02-09T07:09:15.503864721Z" level=info msg="CreateContainer within sandbox \"6ccdd4b88b4656689480d7da432b765d54776be2e94419b0d87bfeee6711d997\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9d0b480558f6c03cb2853d75ca444175c4e67578a6418e138e4998b564ed9482\"" Feb 9 07:09:15.504131 env[1474]: time="2024-02-09T07:09:15.504091512Z" level=info msg="StartContainer for \"9d0b480558f6c03cb2853d75ca444175c4e67578a6418e138e4998b564ed9482\"" Feb 9 07:09:15.052000 audit: BPF prog-id=188 op=LOAD Feb 9 07:09:15.052000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.052000 audit[6131]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5203 pid=6131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:15.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039663933353539643732613138663435393737353437393433396339 Feb 9 07:09:15.052000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.052000 audit[6131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5203 pid=6131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:15.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039663933353539643732613138663435393737353437393433396339 Feb 9 07:09:15.052000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.052000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.052000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.052000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.052000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.052000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.052000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.052000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.052000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.052000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.052000 audit: BPF prog-id=189 op=LOAD Feb 9 07:09:15.052000 audit[6131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021b010 items=0 ppid=5203 pid=6131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:15.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039663933353539643732613138663435393737353437393433396339 Feb 9 07:09:15.180000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.180000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.180000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.180000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.180000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.180000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.180000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.180000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.180000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.180000 audit: BPF prog-id=190 op=LOAD Feb 9 07:09:15.180000 audit[6131]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021b058 items=0 ppid=5203 pid=6131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:15.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039663933353539643732613138663435393737353437393433396339 Feb 9 07:09:15.308000 audit: BPF prog-id=190 op=UNLOAD Feb 9 07:09:15.308000 audit: BPF prog-id=189 op=UNLOAD Feb 9 07:09:15.308000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.308000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.308000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.308000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.308000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.308000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.308000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.308000 audit[6131]: AVC avc: denied { perfmon } for pid=6131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.308000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.308000 audit[6131]: AVC avc: denied { bpf } for pid=6131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.308000 audit: BPF prog-id=191 op=LOAD Feb 9 07:09:15.308000 audit[6131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021b468 items=0 ppid=5203 pid=6131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:15.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039663933353539643732613138663435393737353437393433396339 Feb 9 07:09:15.583155 systemd[1]: Started cri-containerd-9d0b480558f6c03cb2853d75ca444175c4e67578a6418e138e4998b564ed9482.scope. Feb 9 07:09:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit: BPF prog-id=192 op=LOAD Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5252 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:15.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964306234383035353866366330336362323835336437356361343434 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5252 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:15.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964306234383035353866366330336362323835336437356361343434 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit: BPF prog-id=193 op=LOAD Feb 9 07:09:15.588000 audit[6155]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000243d80 items=0 ppid=5252 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:15.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964306234383035353866366330336362323835336437356361343434 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit: BPF prog-id=194 op=LOAD Feb 9 07:09:15.588000 audit[6155]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000243dc8 items=0 ppid=5252 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:15.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964306234383035353866366330336362323835336437356361343434 Feb 9 07:09:15.588000 audit: BPF prog-id=194 op=UNLOAD Feb 9 07:09:15.588000 audit: BPF prog-id=193 op=UNLOAD Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { perfmon } for pid=6155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit[6155]: AVC avc: denied { bpf } for pid=6155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 07:09:15.588000 audit: BPF prog-id=195 op=LOAD Feb 9 07:09:15.588000 audit[6155]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003881d8 items=0 ppid=5252 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:15.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964306234383035353866366330336362323835336437356361343434 Feb 9 07:09:15.609814 env[1474]: time="2024-02-09T07:09:15.609785719Z" level=info msg="StartContainer for \"09f93559d72a18f459775479439c94ceb0497416f12a906b2987c5678a311dc7\" returns successfully" Feb 9 07:09:15.620747 env[1474]: time="2024-02-09T07:09:15.620721808Z" level=info msg="StartContainer for \"9d0b480558f6c03cb2853d75ca444175c4e67578a6418e138e4998b564ed9482\" returns successfully" Feb 9 07:09:15.865000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:09:15.865000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b600e0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:09:15.865000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:09:15.982000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:09:15.982000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001f14020 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:09:15.982000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:09:16.234905 kubelet[2572]: I0209 07:09:16.234726 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5d665684-j27ct" podStartSLOduration=2.122797946 podCreationTimestamp="2024-02-09 07:06:23 +0000 UTC" firstStartedPulling="2024-02-09 07:06:24.296703919 +0000 UTC m=+120.073154487" lastFinishedPulling="2024-02-09 07:09:15.408522172 +0000 UTC m=+291.184972743" observedRunningTime="2024-02-09 07:09:16.234249441 +0000 UTC m=+292.010700093" watchObservedRunningTime="2024-02-09 07:09:16.234616202 +0000 UTC m=+292.011066830" Feb 9 07:09:16.257000 audit[6225]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=6225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:09:16.257000 audit[6225]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffeb944f2f0 a2=0 a3=7ffeb944f2dc items=0 ppid=2848 pid=6225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:16.257000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:09:16.260000 audit[6225]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=6225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:09:16.260000 audit[6225]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffeb944f2f0 a2=0 a3=7ffeb944f2dc items=0 ppid=2848 pid=6225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:16.260000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:09:16.294000 audit[6227]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=6227 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:09:16.294000 audit[6227]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc6e3fd4b0 a2=0 a3=7ffc6e3fd49c items=0 ppid=2848 pid=6227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:16.294000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:09:16.297000 audit[6227]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=6227 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:09:16.297000 audit[6227]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc6e3fd4b0 a2=0 a3=7ffc6e3fd49c items=0 ppid=2848 pid=6227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:16.297000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:09:19.878000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:19.878000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013c9e30 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:09:19.878000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:09:19.878000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:19.878000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00015f5c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:09:19.878000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:09:19.932000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:19.961429 kernel: kauditd_printk_skb: 128 callbacks suppressed Feb 9 07:09:19.961547 kernel: audit: type=1400 audit(1707462559.932:1458): avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:19.932000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0121b90a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:09:20.154447 kernel: audit: type=1300 audit(1707462559.932:1458): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0121b90a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:09:20.154489 kernel: audit: type=1327 audit(1707462559.932:1458): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:09:19.932000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:09:20.248572 kernel: audit: type=1400 audit(1707462559.932:1459): avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:19.932000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:20.340673 kernel: audit: type=1300 audit(1707462559.932:1459): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c011c09350 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:09:19.932000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c011c09350 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:09:20.439886 kernel: audit: type=1327 audit(1707462559.932:1459): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:09:19.932000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:09:19.934000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:20.626765 kernel: audit: type=1400 audit(1707462559.934:1460): avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:20.626800 kernel: audit: type=1300 audit(1707462559.934:1460): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c011c093b0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:09:19.934000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c011c093b0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:09:19.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:09:20.820579 kernel: audit: type=1327 audit(1707462559.934:1460): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:09:20.820616 kernel: audit: type=1400 audit(1707462559.934:1461): avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:19.934000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:19.934000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c011c093e0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:09:19.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:09:19.934000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:19.934000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01208c520 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:09:19.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:09:19.971000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:19.971000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c015646000 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:09:19.971000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:09:24.024000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:24.024000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012e0240 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:09:24.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:09:24.024000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:24.024000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001cb2020 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:09:24.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:09:24.025000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:24.025000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cb2040 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:09:24.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:09:24.025000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:09:24.025000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001151480 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:09:24.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:09:24.106369 kubelet[2572]: I0209 07:09:24.106345 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5d665684-dgtnx" podStartSLOduration=10.489330516 podCreationTimestamp="2024-02-09 07:06:23 +0000 UTC" firstStartedPulling="2024-02-09 07:06:24.270520837 +0000 UTC m=+120.046971404" lastFinishedPulling="2024-02-09 07:09:14.887500046 +0000 UTC m=+290.663950617" observedRunningTime="2024-02-09 07:09:16.25360918 +0000 UTC m=+292.030059822" watchObservedRunningTime="2024-02-09 07:09:24.106309729 +0000 UTC m=+299.882760299" Feb 9 07:09:24.111000 audit[6296]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=6296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:09:24.111000 audit[6296]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd51a09fd0 a2=0 a3=7ffd51a09fbc items=0 ppid=2848 pid=6296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:24.111000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:09:24.124000 audit[6296]: NETFILTER_CFG table=nat:122 family=2 entries=27 op=nft_register_chain pid=6296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:09:24.124000 audit[6296]: SYSCALL arch=c000003e syscall=46 success=yes exit=8980 a0=3 a1=7ffd51a09fd0 a2=0 a3=7ffd51a09fbc items=0 ppid=2848 pid=6296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:24.124000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:09:24.138000 audit[6299]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=6299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:09:24.138000 audit[6299]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffda4858ed0 a2=0 a3=7ffda4858ebc items=0 ppid=2848 pid=6299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:24.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:09:24.151000 audit[6299]: NETFILTER_CFG table=nat:124 family=2 entries=34 op=nft_register_chain pid=6299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:09:24.151000 audit[6299]: SYSCALL arch=c000003e syscall=46 success=yes exit=10868 a0=3 a1=7ffda4858ed0 a2=0 a3=7ffda4858ebc items=0 ppid=2848 pid=6299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:09:24.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:09:57.748616 systemd[1]: Started sshd@14-139.178.90.101:22-85.209.11.254:9406.service. Feb 9 07:09:57.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-85.209.11.254:9406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:09:57.775565 kernel: kauditd_printk_skb: 32 callbacks suppressed Feb 9 07:09:57.775609 kernel: audit: type=1130 audit(1707462597.748:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-85.209.11.254:9406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:09:59.632593 sshd[6411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.254 user=root Feb 9 07:09:59.632000 audit[6411]: USER_AUTH pid=6411 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 9 07:09:59.722693 kernel: audit: type=1100 audit(1707462599.632:1473): pid=6411 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 9 07:10:01.160034 sshd[6411]: Failed password for root from 85.209.11.254 port 9406 ssh2 Feb 9 07:10:01.952091 sshd[6411]: Connection closed by authenticating user root 85.209.11.254 port 9406 [preauth] Feb 9 07:10:01.954660 systemd[1]: sshd@14-139.178.90.101:22-85.209.11.254:9406.service: Deactivated successfully. Feb 9 07:10:01.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-85.209.11.254:9406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:10:02.046567 kernel: audit: type=1131 audit(1707462601.954:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-85.209.11.254:9406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:10:09.460612 systemd[1]: Started sshd@15-139.178.90.101:22-144.91.92.112:43706.service. Feb 9 07:10:09.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.101:22-144.91.92.112:43706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:10:09.552679 kernel: audit: type=1130 audit(1707462609.460:1475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.101:22-144.91.92.112:43706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:10:10.442900 sshd[6439]: Invalid user linuxacademy from 144.91.92.112 port 43706 Feb 9 07:10:10.448971 sshd[6439]: pam_faillock(sshd:auth): User unknown Feb 9 07:10:10.449957 sshd[6439]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:10:10.450049 sshd[6439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.92.112 Feb 9 07:10:10.450937 sshd[6439]: pam_faillock(sshd:auth): User unknown Feb 9 07:10:10.450000 audit[6439]: USER_AUTH pid=6439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="linuxacademy" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:10:10.543677 kernel: audit: type=1100 audit(1707462610.450:1476): pid=6439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="linuxacademy" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:10:12.154397 sshd[6439]: Failed password for invalid user linuxacademy from 144.91.92.112 port 43706 ssh2 Feb 9 07:10:12.388830 sshd[6439]: Received disconnect from 144.91.92.112 port 43706:11: Bye Bye [preauth] Feb 9 07:10:12.388830 sshd[6439]: Disconnected from invalid user linuxacademy 144.91.92.112 port 43706 [preauth] Feb 9 07:10:12.391373 systemd[1]: sshd@15-139.178.90.101:22-144.91.92.112:43706.service: Deactivated successfully. Feb 9 07:10:12.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.101:22-144.91.92.112:43706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:10:12.483501 kernel: audit: type=1131 audit(1707462612.391:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.101:22-144.91.92.112:43706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:10:15.867000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:10:15.867000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001e68d00 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:10:16.060767 kernel: audit: type=1400 audit(1707462615.867:1478): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:10:16.060814 kernel: audit: type=1300 audit(1707462615.867:1478): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001e68d00 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:10:16.060833 kernel: audit: type=1327 audit(1707462615.867:1478): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:10:15.867000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:10:16.154392 kernel: audit: type=1400 audit(1707462615.984:1479): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:10:15.984000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:10:15.984000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001f14dc0 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:10:16.348561 kernel: audit: type=1300 audit(1707462615.984:1479): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001f14dc0 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:10:16.348620 kernel: audit: type=1327 audit(1707462615.984:1479): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:10:15.984000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:10:19.879000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:19.879000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000467320 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:10:20.098412 kernel: audit: type=1400 audit(1707462619.879:1480): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:20.098451 kernel: audit: type=1300 audit(1707462619.879:1480): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000467320 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:10:20.098468 kernel: audit: type=1327 audit(1707462619.879:1480): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:10:19.879000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:10:20.192144 kernel: audit: type=1400 audit(1707462619.879:1481): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:19.879000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:19.879000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001637400 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:10:19.879000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:10:19.933000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:19.933000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00734f3b0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:10:19.933000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:19.933000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:10:19.933000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c009465ce0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:10:19.933000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:10:19.934000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:19.934000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006f91ca0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:10:19.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:10:19.934000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:19.934000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:19.934000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c010d29620 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:10:19.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:10:19.934000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c011c084b0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:10:19.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:10:19.973000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:19.973000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c014ffa1e0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:10:19.973000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:10:24.026000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:24.054407 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 07:10:24.054474 kernel: audit: type=1400 audit(1707462624.026:1488): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:24.026000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:24.235128 kernel: audit: type=1400 audit(1707462624.026:1489): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:24.235194 kernel: audit: type=1300 audit(1707462624.026:1489): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012e0000 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:10:24.026000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012e0000 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:10:24.026000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001cb3f20 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:10:24.476475 kernel: audit: type=1300 audit(1707462624.026:1488): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001cb3f20 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:10:24.476566 kernel: audit: type=1327 audit(1707462624.026:1488): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:10:24.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:10:24.570043 kernel: audit: type=1327 audit(1707462624.026:1489): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:10:24.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:10:24.027000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:24.753415 kernel: audit: type=1400 audit(1707462624.027:1490): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:24.753453 kernel: audit: type=1300 audit(1707462624.027:1490): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016376e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:10:24.027000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016376e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:10:24.873820 kernel: audit: type=1327 audit(1707462624.027:1490): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:10:24.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:10:24.967027 kernel: audit: type=1400 audit(1707462624.027:1491): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:24.027000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:10:24.027000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001637700 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:10:24.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:10:25.659466 systemd[1]: Started sshd@16-139.178.90.101:22-74.121.149.150:54502.service. Feb 9 07:10:25.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.101:22-74.121.149.150:54502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:10:29.161655 sshd[6513]: Invalid user tin from 74.121.149.150 port 54502 Feb 9 07:10:29.167898 sshd[6513]: pam_faillock(sshd:auth): User unknown Feb 9 07:10:29.169022 sshd[6513]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:10:29.169114 sshd[6513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.121.149.150 Feb 9 07:10:29.170028 sshd[6513]: pam_faillock(sshd:auth): User unknown Feb 9 07:10:29.169000 audit[6513]: USER_AUTH pid=6513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tin" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:10:29.197893 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 07:10:29.197944 kernel: audit: type=1100 audit(1707462629.169:1493): pid=6513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tin" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:10:31.148780 sshd[6513]: Failed password for invalid user tin from 74.121.149.150 port 54502 ssh2 Feb 9 07:10:32.758832 sshd[6513]: Received disconnect from 74.121.149.150 port 54502:11: Bye Bye [preauth] Feb 9 07:10:32.758832 sshd[6513]: Disconnected from invalid user tin 74.121.149.150 port 54502 [preauth] Feb 9 07:10:32.761381 systemd[1]: sshd@16-139.178.90.101:22-74.121.149.150:54502.service: Deactivated successfully. Feb 9 07:10:32.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.101:22-74.121.149.150:54502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:10:32.852666 kernel: audit: type=1131 audit(1707462632.761:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.101:22-74.121.149.150:54502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:10:42.055929 update_engine[1464]: I0209 07:10:42.055816 1464 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 07:10:42.055929 update_engine[1464]: I0209 07:10:42.055896 1464 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 07:10:42.057573 update_engine[1464]: I0209 07:10:42.057524 1464 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 07:10:42.058463 update_engine[1464]: I0209 07:10:42.058383 1464 omaha_request_params.cc:62] Current group set to lts Feb 9 07:10:42.058722 update_engine[1464]: I0209 07:10:42.058691 1464 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 07:10:42.058722 update_engine[1464]: I0209 07:10:42.058712 1464 update_attempter.cc:643] Scheduling an action processor start. Feb 9 07:10:42.058940 update_engine[1464]: I0209 07:10:42.058745 1464 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 07:10:42.058940 update_engine[1464]: I0209 07:10:42.058809 1464 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 07:10:42.059146 update_engine[1464]: I0209 07:10:42.058948 1464 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 07:10:42.059146 update_engine[1464]: I0209 07:10:42.058966 1464 omaha_request_action.cc:271] Request: Feb 9 07:10:42.059146 update_engine[1464]: Feb 9 07:10:42.059146 update_engine[1464]: Feb 9 07:10:42.059146 update_engine[1464]: Feb 9 07:10:42.059146 update_engine[1464]: Feb 9 07:10:42.059146 update_engine[1464]: Feb 9 07:10:42.059146 update_engine[1464]: Feb 9 07:10:42.059146 update_engine[1464]: Feb 9 07:10:42.059146 update_engine[1464]: Feb 9 07:10:42.059146 update_engine[1464]: I0209 07:10:42.058976 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 07:10:42.060170 locksmithd[1511]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 07:10:42.062024 update_engine[1464]: I0209 07:10:42.061951 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 07:10:42.062232 update_engine[1464]: E0209 07:10:42.062183 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 07:10:42.062357 update_engine[1464]: I0209 07:10:42.062336 1464 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 07:10:51.990733 update_engine[1464]: I0209 07:10:51.990618 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 07:10:51.991913 update_engine[1464]: I0209 07:10:51.991082 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 07:10:51.991913 update_engine[1464]: E0209 07:10:51.991284 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 07:10:51.991913 update_engine[1464]: I0209 07:10:51.991479 1464 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 07:11:01.990831 update_engine[1464]: I0209 07:11:01.990710 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 07:11:01.991837 update_engine[1464]: I0209 07:11:01.991182 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 07:11:01.991837 update_engine[1464]: E0209 07:11:01.991381 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 07:11:01.991837 update_engine[1464]: I0209 07:11:01.991598 1464 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 07:11:11.990856 update_engine[1464]: I0209 07:11:11.990734 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 07:11:11.991794 update_engine[1464]: I0209 07:11:11.991205 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 07:11:11.991794 update_engine[1464]: E0209 07:11:11.991425 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 07:11:11.991794 update_engine[1464]: I0209 07:11:11.991604 1464 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 07:11:11.991794 update_engine[1464]: I0209 07:11:11.991622 1464 omaha_request_action.cc:621] Omaha request response: Feb 9 07:11:11.991794 update_engine[1464]: E0209 07:11:11.991770 1464 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 07:11:11.991794 update_engine[1464]: I0209 07:11:11.991798 1464 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 07:11:11.992420 update_engine[1464]: I0209 07:11:11.991808 1464 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 07:11:11.992420 update_engine[1464]: I0209 07:11:11.991818 1464 update_attempter.cc:306] Processing Done. Feb 9 07:11:11.992420 update_engine[1464]: E0209 07:11:11.991844 1464 update_attempter.cc:619] Update failed. Feb 9 07:11:11.992420 update_engine[1464]: I0209 07:11:11.991853 1464 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 07:11:11.992420 update_engine[1464]: I0209 07:11:11.991863 1464 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 07:11:11.992420 update_engine[1464]: I0209 07:11:11.991873 1464 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 07:11:11.992420 update_engine[1464]: I0209 07:11:11.992027 1464 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 07:11:11.992420 update_engine[1464]: I0209 07:11:11.992079 1464 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 07:11:11.992420 update_engine[1464]: I0209 07:11:11.992089 1464 omaha_request_action.cc:271] Request: Feb 9 07:11:11.992420 update_engine[1464]: Feb 9 07:11:11.992420 update_engine[1464]: Feb 9 07:11:11.992420 update_engine[1464]: Feb 9 07:11:11.992420 update_engine[1464]: Feb 9 07:11:11.992420 update_engine[1464]: Feb 9 07:11:11.992420 update_engine[1464]: Feb 9 07:11:11.992420 update_engine[1464]: I0209 07:11:11.992098 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 07:11:11.992420 update_engine[1464]: I0209 07:11:11.992411 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 07:11:11.994019 update_engine[1464]: E0209 07:11:11.992592 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 07:11:11.994019 update_engine[1464]: I0209 07:11:11.992727 1464 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 07:11:11.994019 update_engine[1464]: I0209 07:11:11.992740 1464 omaha_request_action.cc:621] Omaha request response: Feb 9 07:11:11.994019 update_engine[1464]: I0209 07:11:11.992751 1464 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 07:11:11.994019 update_engine[1464]: I0209 07:11:11.992759 1464 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 07:11:11.994019 update_engine[1464]: I0209 07:11:11.992767 1464 update_attempter.cc:306] Processing Done. Feb 9 07:11:11.994019 update_engine[1464]: I0209 07:11:11.992774 1464 update_attempter.cc:310] Error event sent. Feb 9 07:11:11.994019 update_engine[1464]: I0209 07:11:11.992795 1464 update_check_scheduler.cc:74] Next update check in 44m6s Feb 9 07:11:11.994804 locksmithd[1511]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 07:11:11.994804 locksmithd[1511]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 07:11:15.260936 systemd[1]: Started sshd@17-139.178.90.101:22-144.91.92.112:43754.service. Feb 9 07:11:15.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.101:22-144.91.92.112:43754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:11:15.352601 kernel: audit: type=1130 audit(1707462675.259:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.101:22-144.91.92.112:43754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:11:15.867000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:11:15.867000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002120cc0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:11:16.062136 kernel: audit: type=1400 audit(1707462675.867:1496): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:11:16.062194 kernel: audit: type=1300 audit(1707462675.867:1496): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002120cc0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:11:16.062212 kernel: audit: type=1327 audit(1707462675.867:1496): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:11:15.867000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:11:16.155556 kernel: audit: type=1400 audit(1707462675.984:1497): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:11:15.984000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:11:16.246229 sshd[6674]: Invalid user minecraft from 144.91.92.112 port 43754 Feb 9 07:11:16.247369 sshd[6674]: pam_faillock(sshd:auth): User unknown Feb 9 07:11:16.247540 sshd[6674]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:11:16.247557 sshd[6674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.92.112 Feb 9 07:11:16.247730 sshd[6674]: pam_faillock(sshd:auth): User unknown Feb 9 07:11:15.984000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001f15760 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:11:16.346826 kernel: audit: type=1300 audit(1707462675.984:1497): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001f15760 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:11:16.346862 kernel: audit: type=1327 audit(1707462675.984:1497): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:11:15.984000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:11:16.439980 kernel: audit: type=1100 audit(1707462676.246:1498): pid=6674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="minecraft" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:11:16.246000 audit[6674]: USER_AUTH pid=6674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="minecraft" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:11:18.011169 sshd[6674]: Failed password for invalid user minecraft from 144.91.92.112 port 43754 ssh2 Feb 9 07:11:18.754279 sshd[6674]: Received disconnect from 144.91.92.112 port 43754:11: Bye Bye [preauth] Feb 9 07:11:18.754279 sshd[6674]: Disconnected from invalid user minecraft 144.91.92.112 port 43754 [preauth] Feb 9 07:11:18.756955 systemd[1]: sshd@17-139.178.90.101:22-144.91.92.112:43754.service: Deactivated successfully. Feb 9 07:11:18.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.101:22-144.91.92.112:43754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:11:18.853705 kernel: audit: type=1131 audit(1707462678.756:1499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.101:22-144.91.92.112:43754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:11:19.879000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:19.879000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e0c240 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:11:19.879000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:11:19.879000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:19.879000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b53140 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:11:19.879000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:11:19.932000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:19.932000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:19.932000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007740800 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:11:19.932000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c014f63530 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:11:19.932000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:11:19.932000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:11:19.934000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:19.934000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007a17500 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:11:19.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:11:19.934000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:19.934000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c007740820 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:11:19.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:11:19.934000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:19.934000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c007a17560 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:11:19.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:11:19.973562 kernel: audit: type=1400 audit(1707462679.879:1500): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:19.973000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:19.973000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007a17590 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:11:19.973000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:11:24.025000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:24.054145 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 07:11:24.054271 kernel: audit: type=1400 audit(1707462684.025:1509): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:24.025000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:24.233162 kernel: audit: type=1400 audit(1707462684.025:1508): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:24.233230 kernel: audit: type=1300 audit(1707462684.025:1509): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e0c360 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:11:24.025000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e0c360 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:11:24.352975 kernel: audit: type=1300 audit(1707462684.025:1508): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007d1180 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:11:24.025000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007d1180 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:11:24.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:11:24.474502 kernel: audit: type=1327 audit(1707462684.025:1508): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:11:24.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:11:24.660934 kernel: audit: type=1327 audit(1707462684.025:1509): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:11:24.660993 kernel: audit: type=1400 audit(1707462684.027:1510): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:24.027000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:24.027000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc1ca0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:11:24.871725 kernel: audit: type=1300 audit(1707462684.027:1510): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc1ca0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:11:24.871777 kernel: audit: type=1327 audit(1707462684.027:1510): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:11:24.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:11:24.027000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:25.055564 kernel: audit: type=1400 audit(1707462684.027:1511): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:11:24.027000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e6bd00 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:11:24.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:12:15.868000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:12:15.910287 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:12:15.910373 kernel: audit: type=1400 audit(1707462735.868:1512): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:12:15.868000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002048ca0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:12:16.102792 kernel: audit: type=1300 audit(1707462735.868:1512): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002048ca0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:12:16.102846 kernel: audit: type=1327 audit(1707462735.868:1512): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:12:15.868000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:12:16.195300 kernel: audit: type=1400 audit(1707462736.005:1513): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:12:16.005000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:12:16.289142 kernel: audit: type=1300 audit(1707462736.005:1513): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012fd880 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:12:16.005000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012fd880 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:12:16.385843 kernel: audit: type=1327 audit(1707462736.005:1513): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:12:16.005000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:12:19.881000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:19.881000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c26c00 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:12:20.098290 kernel: audit: type=1400 audit(1707462739.881:1514): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:20.098331 kernel: audit: type=1300 audit(1707462739.881:1514): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c26c00 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:12:20.098350 kernel: audit: type=1327 audit(1707462739.881:1514): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:12:19.881000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:12:19.881000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:20.282450 kernel: audit: type=1400 audit(1707462739.881:1515): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:19.881000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0014abf80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:12:19.881000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:12:19.934000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:19.934000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c015310690 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:12:19.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:12:19.934000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:19.934000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c01564be00 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:12:19.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:12:19.935000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:19.935000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0135211a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:12:19.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:12:19.935000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:19.935000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c010b4fb20 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:12:19.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:12:19.935000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:19.935000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0135211d0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:12:19.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:12:19.974000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:19.974000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c013521320 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:12:19.974000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:12:24.027000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:24.055132 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 07:12:24.055193 kernel: audit: type=1400 audit(1707462744.027:1522): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:24.027000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c26cc0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:12:24.263868 kernel: audit: type=1300 audit(1707462744.027:1522): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c26cc0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:12:24.263935 kernel: audit: type=1327 audit(1707462744.027:1522): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:12:24.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:12:24.027000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:24.356503 kernel: audit: type=1400 audit(1707462744.027:1523): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:24.027000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001636300 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:12:24.566071 kernel: audit: type=1300 audit(1707462744.027:1523): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001636300 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:12:24.566114 kernel: audit: type=1327 audit(1707462744.027:1523): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:12:24.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:12:24.659417 kernel: audit: type=1400 audit(1707462744.028:1524): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:24.028000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:24.749576 kernel: audit: type=1300 audit(1707462744.028:1524): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b4f860 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:12:24.028000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b4f860 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:12:24.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:12:24.870504 kernel: audit: type=1327 audit(1707462744.028:1524): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:12:24.028000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:25.053631 kernel: audit: type=1400 audit(1707462744.028:1525): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:12:24.028000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002de7460 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:12:24.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:12:25.495668 systemd[1]: Started sshd@18-139.178.90.101:22-144.91.92.112:43808.service. Feb 9 07:12:25.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.101:22-144.91.92.112:43808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:26.387122 sshd[6962]: Invalid user vick from 144.91.92.112 port 43808 Feb 9 07:12:26.393043 sshd[6962]: pam_faillock(sshd:auth): User unknown Feb 9 07:12:26.393914 sshd[6962]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:12:26.393994 sshd[6962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.92.112 Feb 9 07:12:26.394826 sshd[6962]: pam_faillock(sshd:auth): User unknown Feb 9 07:12:26.394000 audit[6962]: USER_AUTH pid=6962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="vick" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:12:28.103291 sshd[6962]: Failed password for invalid user vick from 144.91.92.112 port 43808 ssh2 Feb 9 07:12:29.493415 sshd[6962]: Received disconnect from 144.91.92.112 port 43808:11: Bye Bye [preauth] Feb 9 07:12:29.493415 sshd[6962]: Disconnected from invalid user vick 144.91.92.112 port 43808 [preauth] Feb 9 07:12:29.496000 systemd[1]: sshd@18-139.178.90.101:22-144.91.92.112:43808.service: Deactivated successfully. Feb 9 07:12:29.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.101:22-144.91.92.112:43808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:29.523796 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 9 07:12:29.523831 kernel: audit: type=1131 audit(1707462749.496:1528): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.101:22-144.91.92.112:43808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:01.057699 systemd[1]: Started sshd@19-139.178.90.101:22-74.121.149.150:54622.service. Feb 9 07:13:01.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.101:22-74.121.149.150:54622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:01.148704 kernel: audit: type=1130 audit(1707462781.057:1529): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.101:22-74.121.149.150:54622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:04.163116 sshd[7075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.121.149.150 user=root Feb 9 07:13:04.162000 audit[7075]: USER_AUTH pid=7075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:13:04.253556 kernel: audit: type=1100 audit(1707462784.162:1530): pid=7075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:13:06.087300 sshd[7075]: Failed password for root from 74.121.149.150 port 54622 ssh2 Feb 9 07:13:06.250776 sshd[7075]: Received disconnect from 74.121.149.150 port 54622:11: Bye Bye [preauth] Feb 9 07:13:06.250776 sshd[7075]: Disconnected from authenticating user root 74.121.149.150 port 54622 [preauth] Feb 9 07:13:06.253583 systemd[1]: sshd@19-139.178.90.101:22-74.121.149.150:54622.service: Deactivated successfully. Feb 9 07:13:06.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.101:22-74.121.149.150:54622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:06.343533 kernel: audit: type=1131 audit(1707462786.253:1531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.101:22-74.121.149.150:54622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:15.869000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:13:15.869000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001f90de0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:13:15.968567 kernel: audit: type=1400 audit(1707462795.869:1532): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:13:15.968645 kernel: audit: type=1300 audit(1707462795.869:1532): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001f90de0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:13:15.869000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:13:16.066534 kernel: audit: type=1327 audit(1707462795.869:1532): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:13:16.005000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:13:16.256725 kernel: audit: type=1400 audit(1707462796.005:1533): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:13:16.256834 kernel: audit: type=1300 audit(1707462796.005:1533): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000429240 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:13:16.005000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000429240 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:13:16.353730 kernel: audit: type=1327 audit(1707462796.005:1533): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:13:16.005000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:13:19.880000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:19.880000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013632e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:13:20.101071 kernel: audit: type=1400 audit(1707462799.880:1534): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:20.101109 kernel: audit: type=1300 audit(1707462799.880:1534): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013632e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:13:20.101128 kernel: audit: type=1327 audit(1707462799.880:1534): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:13:19.880000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:13:20.194563 kernel: audit: type=1400 audit(1707462799.881:1535): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:19.881000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:19.881000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a9ef60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:13:19.881000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:13:19.934000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:19.934000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0110ad3a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:13:19.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:13:19.934000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:19.934000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01010aea0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:13:19.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:13:19.935000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:19.935000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0048fd740 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:13:19.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:13:19.935000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:19.935000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c01010af00 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:13:19.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:13:19.935000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:19.935000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0110ad3c0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:13:19.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:13:19.974000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:19.974000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c014086090 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:13:19.974000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:13:24.026000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:24.055400 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 07:13:24.055445 kernel: audit: type=1400 audit(1707462804.026:1543): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:24.026000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:24.235568 kernel: audit: type=1400 audit(1707462804.026:1542): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:24.235647 kernel: audit: type=1300 audit(1707462804.026:1543): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009d1640 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:13:24.026000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009d1640 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:13:24.026000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017a1280 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:13:24.476998 kernel: audit: type=1300 audit(1707462804.026:1542): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017a1280 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:13:24.477069 kernel: audit: type=1327 audit(1707462804.026:1542): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:13:24.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:13:24.570619 kernel: audit: type=1327 audit(1707462804.026:1543): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:13:24.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:13:24.027000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:24.754053 kernel: audit: type=1400 audit(1707462804.027:1544): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:24.754095 kernel: audit: type=1300 audit(1707462804.027:1544): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017a12a0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:13:24.027000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017a12a0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:13:24.874552 kernel: audit: type=1327 audit(1707462804.027:1544): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:13:24.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:13:24.967922 kernel: audit: type=1400 audit(1707462804.027:1545): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:24.027000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:13:24.027000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001363580 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:13:24.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:13:31.341894 systemd[1]: Started sshd@20-139.178.90.101:22-144.91.92.112:43860.service. Feb 9 07:13:31.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.101:22-144.91.92.112:43860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:31.369096 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:13:31.369191 kernel: audit: type=1130 audit(1707462811.340:1546): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.101:22-144.91.92.112:43860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:32.295921 sshd[7171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.92.112 user=root Feb 9 07:13:32.294000 audit[7171]: USER_AUTH pid=7171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:13:32.391558 kernel: audit: type=1100 audit(1707462812.294:1547): pid=7171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 07:13:34.064456 sshd[7171]: Failed password for root from 144.91.92.112 port 43860 ssh2 Feb 9 07:13:34.424601 sshd[7171]: Received disconnect from 144.91.92.112 port 43860:11: Bye Bye [preauth] Feb 9 07:13:34.424601 sshd[7171]: Disconnected from authenticating user root 144.91.92.112 port 43860 [preauth] Feb 9 07:13:34.427242 systemd[1]: sshd@20-139.178.90.101:22-144.91.92.112:43860.service: Deactivated successfully. Feb 9 07:13:34.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.101:22-144.91.92.112:43860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:34.518518 kernel: audit: type=1131 audit(1707462814.426:1548): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.101:22-144.91.92.112:43860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:14:15.871000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:14:15.871000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001f91d60 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:14:16.066119 kernel: audit: type=1400 audit(1707462855.871:1549): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:14:16.066160 kernel: audit: type=1300 audit(1707462855.871:1549): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001f91d60 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:14:16.066178 kernel: audit: type=1327 audit(1707462855.871:1549): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:14:15.871000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:14:16.159938 kernel: audit: type=1400 audit(1707462856.005:1550): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:14:16.005000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:14:16.256969 kernel: audit: type=1300 audit(1707462856.005:1550): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00200e340 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:14:16.005000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00200e340 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:14:16.356398 kernel: audit: type=1327 audit(1707462856.005:1550): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:14:16.005000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:14:19.882000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:19.882000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00165a930 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:14:20.098396 kernel: audit: type=1400 audit(1707462859.882:1551): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:20.098482 kernel: audit: type=1300 audit(1707462859.882:1551): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00165a930 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:14:20.098541 kernel: audit: type=1327 audit(1707462859.882:1551): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:14:19.882000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:14:19.882000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:20.281885 kernel: audit: type=1400 audit(1707462859.882:1552): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:19.882000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001abb840 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:14:19.882000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:14:19.935000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:19.935000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0106fbc80 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:14:19.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:14:19.935000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:19.935000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c005604d80 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:14:19.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:14:19.936000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:19.936000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c005604de0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:14:19.936000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:14:19.936000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:19.936000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c005604ed0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:14:19.936000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:19.936000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:14:19.936000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0151e9220 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:14:19.936000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:14:19.975000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:19.975000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0146434a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:14:19.975000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:14:24.027000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:24.055579 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 07:14:24.055687 kernel: audit: type=1400 audit(1707462864.027:1560): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:24.027000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:24.145561 kernel: audit: type=1400 audit(1707462864.027:1559): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:24.027000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b23000 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:14:24.355034 kernel: audit: type=1300 audit(1707462864.027:1560): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b23000 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:14:24.355098 kernel: audit: type=1300 audit(1707462864.027:1559): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010434e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:14:24.027000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010434e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:14:24.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:14:24.475498 kernel: audit: type=1327 audit(1707462864.027:1560): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:14:24.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:14:24.661983 kernel: audit: type=1327 audit(1707462864.027:1559): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:14:24.029000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:24.751939 kernel: audit: type=1400 audit(1707462864.029:1561): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:24.751968 kernel: audit: type=1300 audit(1707462864.029:1561): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001abba20 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:14:24.029000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001abba20 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:14:24.872086 kernel: audit: type=1327 audit(1707462864.029:1561): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:14:24.029000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:14:24.029000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:25.055069 kernel: audit: type=1400 audit(1707462864.029:1562): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:14:24.029000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ea9a60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:14:24.029000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:15:15.872000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:15:15.899752 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:15:15.899871 kernel: audit: type=1400 audit(1707462915.872:1563): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:15:15.872000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001ce2ae0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:15:16.092696 kernel: audit: type=1300 audit(1707462915.872:1563): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001ce2ae0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:15:16.092768 kernel: audit: type=1327 audit(1707462915.872:1563): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:15:15.872000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:15:16.007000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:15:16.279160 kernel: audit: type=1400 audit(1707462916.007:1564): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:15:16.279194 kernel: audit: type=1300 audit(1707462916.007:1564): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012b0f00 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:15:16.007000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012b0f00 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:15:16.377410 kernel: audit: type=1327 audit(1707462916.007:1564): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:15:16.007000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:15:19.884000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:19.884000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002af9de0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:15:20.098398 kernel: audit: type=1400 audit(1707462919.884:1565): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:20.098448 kernel: audit: type=1300 audit(1707462919.884:1565): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002af9de0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:15:20.098471 kernel: audit: type=1327 audit(1707462919.884:1565): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:15:19.884000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:15:19.884000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:20.282482 kernel: audit: type=1400 audit(1707462919.884:1566): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:19.884000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e552f0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:15:19.884000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:15:19.936000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:19.936000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00f905dc0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:15:19.936000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:15:19.936000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:19.936000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c008a75e90 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:15:19.936000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:15:19.937000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:19.937000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c013640960 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:15:19.937000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:15:19.937000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:19.937000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c008a75ef0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:15:19.937000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:15:19.937000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:19.937000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c007aac660 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:15:19.937000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:15:19.976000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:19.976000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01331d860 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:15:19.976000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:15:24.028000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:24.055310 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 07:15:24.055381 kernel: audit: type=1400 audit(1707462924.028:1574): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:24.028000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:24.233922 kernel: audit: type=1400 audit(1707462924.028:1573): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:24.233992 kernel: audit: type=1300 audit(1707462924.028:1573): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012e0c40 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:15:24.028000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012e0c40 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:15:24.028000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c27c80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:15:24.472572 kernel: audit: type=1300 audit(1707462924.028:1574): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c27c80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:15:24.472629 kernel: audit: type=1327 audit(1707462924.028:1573): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:15:24.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:15:24.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:15:24.659354 kernel: audit: type=1327 audit(1707462924.028:1574): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:15:24.659394 kernel: audit: type=1400 audit(1707462924.029:1575): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:24.029000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:24.749411 kernel: audit: type=1300 audit(1707462924.029:1575): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012e0dc0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:15:24.029000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012e0dc0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:15:24.029000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:15:24.963165 kernel: audit: type=1327 audit(1707462924.029:1575): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:15:24.963195 kernel: audit: type=1400 audit(1707462924.029:1576): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:24.029000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:15:24.029000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012e0de0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:15:24.029000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:15:26.582695 systemd[1]: Started sshd@21-139.178.90.101:22-218.92.0.53:20926.service. Feb 9 07:15:26.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.101:22-218.92.0.53:20926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:26.751152 sshd[7616]: Unable to negotiate with 218.92.0.53 port 20926: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 07:15:26.752992 systemd[1]: sshd@21-139.178.90.101:22-218.92.0.53:20926.service: Deactivated successfully. Feb 9 07:15:26.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.101:22-218.92.0.53:20926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:34.161734 systemd[1]: Started sshd@22-139.178.90.101:22-74.121.149.150:54742.service. Feb 9 07:15:34.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.101:22-74.121.149.150:54742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:34.189012 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 9 07:15:34.189122 kernel: audit: type=1130 audit(1707462934.161:1579): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.101:22-74.121.149.150:54742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:34.765106 sshd[7660]: Invalid user joshua from 74.121.149.150 port 54742 Feb 9 07:15:34.771397 sshd[7660]: pam_faillock(sshd:auth): User unknown Feb 9 07:15:34.772451 sshd[7660]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:15:34.772566 sshd[7660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.121.149.150 Feb 9 07:15:34.773576 sshd[7660]: pam_faillock(sshd:auth): User unknown Feb 9 07:15:34.773000 audit[7660]: USER_AUTH pid=7660 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="joshua" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:15:34.870597 kernel: audit: type=1100 audit(1707462934.773:1580): pid=7660 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="joshua" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:15:36.290950 sshd[7660]: Failed password for invalid user joshua from 74.121.149.150 port 54742 ssh2 Feb 9 07:15:36.654119 sshd[7660]: Received disconnect from 74.121.149.150 port 54742:11: Bye Bye [preauth] Feb 9 07:15:36.654119 sshd[7660]: Disconnected from invalid user joshua 74.121.149.150 port 54742 [preauth] Feb 9 07:15:36.656611 systemd[1]: sshd@22-139.178.90.101:22-74.121.149.150:54742.service: Deactivated successfully. Feb 9 07:15:36.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.101:22-74.121.149.150:54742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:36.747656 kernel: audit: type=1131 audit(1707462936.656:1581): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.101:22-74.121.149.150:54742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:16:15.872000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:16:15.872000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001106420 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:16:16.067959 kernel: audit: type=1400 audit(1707462975.872:1582): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:16:16.068020 kernel: audit: type=1300 audit(1707462975.872:1582): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001106420 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:16:16.068064 kernel: audit: type=1327 audit(1707462975.872:1582): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:16:15.872000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:16:16.066000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:16:16.257774 kernel: audit: type=1400 audit(1707462976.066:1583): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:16:16.257814 kernel: audit: type=1300 audit(1707462976.066:1583): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000429560 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:16:16.066000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000429560 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:16:16.354392 kernel: audit: type=1327 audit(1707462976.066:1583): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:16:16.066000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:16:19.883000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:19.883000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b4e960 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:16:20.098043 kernel: audit: type=1400 audit(1707462979.883:1584): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:20.098104 kernel: audit: type=1300 audit(1707462979.883:1584): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b4e960 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:16:20.098121 kernel: audit: type=1327 audit(1707462979.883:1584): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:16:19.883000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:16:20.191709 kernel: audit: type=1400 audit(1707462979.883:1585): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:19.883000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:19.883000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012cd560 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:16:19.883000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:16:19.936000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:19.936000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007227080 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:16:19.936000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:16:19.936000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:19.936000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0049cccf0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:16:19.936000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:16:19.937000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:19.937000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006c0b8a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:16:19.937000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:16:19.937000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:19.937000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0049ccd50 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:16:19.937000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:16:19.937000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:19.937000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0140498f0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:16:19.937000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:16:19.975000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:19.975000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c014f552c0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:16:19.975000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:16:24.028000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:24.056540 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 07:16:24.056585 kernel: audit: type=1400 audit(1707462984.028:1592): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:24.028000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e6bf60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:16:24.265911 kernel: audit: type=1300 audit(1707462984.028:1592): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e6bf60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:16:24.265981 kernel: audit: type=1327 audit(1707462984.028:1592): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:16:24.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:16:24.359316 kernel: audit: type=1400 audit(1707462984.028:1593): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:24.028000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:24.449511 kernel: audit: type=1300 audit(1707462984.028:1593): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ccc1a0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:16:24.028000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ccc1a0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:16:24.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:16:24.663352 kernel: audit: type=1327 audit(1707462984.028:1593): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:16:24.663404 kernel: audit: type=1400 audit(1707462984.028:1594): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:24.028000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:24.753408 kernel: audit: type=1300 audit(1707462984.028:1594): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001362140 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:16:24.028000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001362140 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:16:24.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:16:24.967218 kernel: audit: type=1327 audit(1707462984.028:1594): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:16:24.967251 kernel: audit: type=1400 audit(1707462984.028:1595): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:24.028000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:16:24.028000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001362160 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:16:24.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:17:15.874000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:17:15.902712 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:17:15.902754 kernel: audit: type=1400 audit(1707463035.874:1596): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:17:15.874000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0019a0be0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:17:15.874000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:17:16.189053 kernel: audit: type=1300 audit(1707463035.874:1596): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0019a0be0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:17:16.189110 kernel: audit: type=1327 audit(1707463035.874:1596): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:17:16.189132 kernel: audit: type=1400 audit(1707463036.068:1597): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:17:16.068000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:17:16.068000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00123f140 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:17:16.379700 kernel: audit: type=1300 audit(1707463036.068:1597): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00123f140 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:17:16.379731 kernel: audit: type=1327 audit(1707463036.068:1597): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:17:16.068000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:17:19.885000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:19.885000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002633fb0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:17:20.106705 kernel: audit: type=1400 audit(1707463039.885:1598): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:20.106743 kernel: audit: type=1300 audit(1707463039.885:1598): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002633fb0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:17:20.106759 kernel: audit: type=1327 audit(1707463039.885:1598): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:17:19.885000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:17:20.200236 kernel: audit: type=1400 audit(1707463039.885:1599): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:19.885000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:19.885000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ea9380 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:17:19.885000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:17:19.937000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:19.937000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007f64280 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:17:19.937000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:17:19.937000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:19.937000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c012183f80 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:17:19.937000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:17:19.938000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:19.938000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01148a420 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:17:19.938000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:17:19.938000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:19.938000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c001336060 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:17:19.938000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:17:19.938000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:19.938000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01564b7e0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:17:19.938000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:17:19.977000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:19.977000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0074097a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:17:19.977000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:17:24.030000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:24.058079 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 07:17:24.058164 kernel: audit: type=1400 audit(1707463044.030:1606): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:24.030000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cb2da0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:17:24.267004 kernel: audit: type=1300 audit(1707463044.030:1606): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cb2da0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:17:24.267077 kernel: audit: type=1327 audit(1707463044.030:1606): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:17:24.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:17:24.030000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:24.448934 kernel: audit: type=1400 audit(1707463044.030:1607): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:24.448997 kernel: audit: type=1300 audit(1707463044.030:1607): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b23f40 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:17:24.030000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b23f40 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:17:24.569216 kernel: audit: type=1327 audit(1707463044.030:1607): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:17:24.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:17:24.030000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:24.752738 kernel: audit: type=1400 audit(1707463044.030:1608): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:24.752775 kernel: audit: type=1300 audit(1707463044.030:1608): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001b23f60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:17:24.030000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001b23f60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:17:24.873276 kernel: audit: type=1327 audit(1707463044.030:1608): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:17:24.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:17:24.966575 kernel: audit: type=1400 audit(1707463044.030:1609): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:24.030000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:17:24.030000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b23f80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:17:24.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:18:06.158729 systemd[1]: Started sshd@23-139.178.90.101:22-74.121.149.150:54862.service. Feb 9 07:18:06.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.101:22-74.121.149.150:54862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:18:06.185860 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:18:06.185946 kernel: audit: type=1130 audit(1707463086.158:1610): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.101:22-74.121.149.150:54862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:18:11.153426 sshd[8177]: Invalid user ftpadmin from 74.121.149.150 port 54862 Feb 9 07:18:11.159861 sshd[8177]: pam_faillock(sshd:auth): User unknown Feb 9 07:18:11.160917 sshd[8177]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:18:11.161007 sshd[8177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.121.149.150 Feb 9 07:18:11.161898 sshd[8177]: pam_faillock(sshd:auth): User unknown Feb 9 07:18:11.161000 audit[8177]: USER_AUTH pid=8177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftpadmin" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:18:11.253583 kernel: audit: type=1100 audit(1707463091.161:1611): pid=8177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftpadmin" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:18:13.230746 sshd[8177]: Failed password for invalid user ftpadmin from 74.121.149.150 port 54862 ssh2 Feb 9 07:18:13.951034 sshd[8177]: Received disconnect from 74.121.149.150 port 54862:11: Bye Bye [preauth] Feb 9 07:18:13.951034 sshd[8177]: Disconnected from invalid user ftpadmin 74.121.149.150 port 54862 [preauth] Feb 9 07:18:13.953599 systemd[1]: sshd@23-139.178.90.101:22-74.121.149.150:54862.service: Deactivated successfully. Feb 9 07:18:13.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.101:22-74.121.149.150:54862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:18:14.045600 kernel: audit: type=1131 audit(1707463093.953:1612): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.101:22-74.121.149.150:54862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:18:15.875000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:18:15.875000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014aebe0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:18:16.070488 kernel: audit: type=1400 audit(1707463095.875:1613): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:18:16.070550 kernel: audit: type=1300 audit(1707463095.875:1613): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014aebe0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:18:16.070568 kernel: audit: type=1327 audit(1707463095.875:1613): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:18:15.875000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:18:16.068000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:18:16.260339 kernel: audit: type=1400 audit(1707463096.068:1614): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:18:16.260370 kernel: audit: type=1300 audit(1707463096.068:1614): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00149abe0 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:18:16.068000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00149abe0 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:18:16.359206 kernel: audit: type=1327 audit(1707463096.068:1614): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:18:16.068000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:18:19.758224 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 9 07:18:19.764033 systemd-tmpfiles[8209]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 07:18:19.764270 systemd-tmpfiles[8209]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 07:18:19.765049 systemd-tmpfiles[8209]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 07:18:19.776723 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 9 07:18:19.776877 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 9 07:18:19.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:18:19.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:18:19.867984 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 9 07:18:19.953576 kernel: audit: type=1130 audit(1707463099.776:1615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:18:19.953625 kernel: audit: type=1131 audit(1707463099.776:1616): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:18:19.953642 kernel: audit: type=1400 audit(1707463099.885:1617): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:19.885000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:20.044008 kernel: audit: type=1300 audit(1707463099.885:1617): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b236c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:18:19.885000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b236c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:18:20.164691 kernel: audit: type=1327 audit(1707463099.885:1617): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:18:19.885000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:18:19.885000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:20.349751 kernel: audit: type=1400 audit(1707463099.885:1618): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:20.349785 kernel: audit: type=1300 audit(1707463099.885:1618): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001cf4c30 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:18:19.885000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001cf4c30 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:18:19.885000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:18:19.938000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:19.938000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:19.938000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00eceb0c0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:18:19.938000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c014049230 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:18:19.938000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:18:19.938000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:18:19.939000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:19.939000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c014049290 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:18:19.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:18:19.939000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:19.939000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00eceb0e0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:18:19.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:18:19.939000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:19.939000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0140492c0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:18:19.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:18:19.978000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:19.978000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0140493b0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:18:19.978000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:18:24.030000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:24.058338 kernel: kauditd_printk_skb: 19 callbacks suppressed Feb 9 07:18:24.058394 kernel: audit: type=1400 audit(1707463104.030:1625): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:24.030000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:24.239248 kernel: audit: type=1400 audit(1707463104.030:1626): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:24.239318 kernel: audit: type=1300 audit(1707463104.030:1625): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001362080 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:18:24.030000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001362080 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:18:24.030000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002de77c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:18:24.480827 kernel: audit: type=1300 audit(1707463104.030:1626): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002de77c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:18:24.480885 kernel: audit: type=1327 audit(1707463104.030:1626): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:18:24.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:18:24.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:18:24.668007 kernel: audit: type=1327 audit(1707463104.030:1625): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:18:24.031000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:24.758371 kernel: audit: type=1400 audit(1707463104.031:1627): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:24.758408 kernel: audit: type=1300 audit(1707463104.031:1627): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b23c00 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:18:24.031000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b23c00 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:18:24.031000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:18:24.972582 kernel: audit: type=1327 audit(1707463104.031:1627): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:18:24.972623 kernel: audit: type=1400 audit(1707463104.031:1628): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:24.031000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:18:24.031000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002de77e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:18:24.031000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:19:15.875000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:19:15.904073 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:19:15.904158 kernel: audit: type=1400 audit(1707463155.875:1629): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:19:15.875000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001bc6140 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:19:16.094704 kernel: audit: type=1300 audit(1707463155.875:1629): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001bc6140 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:19:16.094736 kernel: audit: type=1327 audit(1707463155.875:1629): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:19:15.875000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:19:16.068000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:19:16.281286 kernel: audit: type=1400 audit(1707463156.068:1630): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:19:16.281318 kernel: audit: type=1300 audit(1707463156.068:1630): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0017e94c0 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:19:16.068000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0017e94c0 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:19:16.068000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:19:16.471410 kernel: audit: type=1327 audit(1707463156.068:1630): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:19:19.886000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:19.886000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009d14e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:19:20.101498 kernel: audit: type=1400 audit(1707463159.886:1631): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:20.101567 kernel: audit: type=1300 audit(1707463159.886:1631): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009d14e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:19:20.101584 kernel: audit: type=1327 audit(1707463159.886:1631): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:19:19.886000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:19:19.886000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:20.285929 kernel: audit: type=1400 audit(1707463159.886:1632): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:19.886000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000145890 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:19:19.886000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:19:19.938000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:19.938000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:19.938000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007c1aba0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:19:19.938000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:19:19.938000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c007409bc0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:19:19.938000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:19:19.939000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:19.939000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007409c80 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:19:19.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:19:19.939000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:19.939000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:19.939000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007968e70 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:19:19.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:19:19.939000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c007c1abe0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:19:19.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:19:19.978000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:19.978000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006069830 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:19:19.978000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:19:24.030000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:24.059758 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 07:19:24.059814 kernel: audit: type=1400 audit(1707463164.030:1639): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:24.030000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc06c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:19:24.268256 kernel: audit: type=1300 audit(1707463164.030:1639): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc06c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:19:24.268332 kernel: audit: type=1327 audit(1707463164.030:1639): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:19:24.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:19:24.030000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:24.361530 kernel: audit: type=1400 audit(1707463164.030:1640): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:24.030000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001aba920 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:19:24.570099 kernel: audit: type=1300 audit(1707463164.030:1640): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001aba920 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:19:24.570140 kernel: audit: type=1327 audit(1707463164.030:1640): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:19:24.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:19:24.031000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:24.753253 kernel: audit: type=1400 audit(1707463164.031:1641): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:24.753287 kernel: audit: type=1300 audit(1707463164.031:1641): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aba940 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:19:24.031000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aba940 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:19:24.031000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:19:24.874577 kernel: audit: type=1327 audit(1707463164.031:1641): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:19:24.031000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:25.056600 kernel: audit: type=1400 audit(1707463164.031:1642): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:19:24.031000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bc06e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:19:24.031000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:20:15.877000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:20:15.917999 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:20:15.918088 kernel: audit: type=1400 audit(1707463215.877:1643): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:20:15.877000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001963480 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:20:16.013546 kernel: audit: type=1300 audit(1707463215.877:1643): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001963480 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:20:15.877000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:20:16.202063 kernel: audit: type=1327 audit(1707463215.877:1643): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:20:16.202134 kernel: audit: type=1400 audit(1707463216.069:1644): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:20:16.069000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:20:16.069000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0013ae280 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:20:16.394666 kernel: audit: type=1300 audit(1707463216.069:1644): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0013ae280 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:20:16.394701 kernel: audit: type=1327 audit(1707463216.069:1644): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:20:16.069000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:20:19.887000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:19.887000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001abba60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:20:20.105914 kernel: audit: type=1400 audit(1707463219.887:1645): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:20.105959 kernel: audit: type=1300 audit(1707463219.887:1645): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001abba60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:20:20.105975 kernel: audit: type=1327 audit(1707463219.887:1645): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:20:19.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:20:20.199201 kernel: audit: type=1400 audit(1707463219.887:1646): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:19.887000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:19.887000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0018fc060 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:20:19.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:20:19.939000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:19.939000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0118ea880 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:20:19.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:20:19.939000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:19.939000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0137ffb60 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:20:19.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:20:19.940000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:19.940000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007c7c600 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:20:19.940000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:20:19.940000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:19.940000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0144317e0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:20:19.940000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:20:19.941000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:19.941000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01464e540 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:20:19.941000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:20:19.980000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:19.980000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007c7c720 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:20:19.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:20:24.032000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:24.060464 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 07:20:24.060511 kernel: audit: type=1400 audit(1707463224.032:1654): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:24.032000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:24.239692 kernel: audit: type=1400 audit(1707463224.032:1653): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:24.239767 kernel: audit: type=1400 audit(1707463224.032:1655): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:24.032000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:24.032000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001abbaa0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:20:24.448368 kernel: audit: type=1300 audit(1707463224.032:1655): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001abbaa0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:20:24.032000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bc1ca0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:20:24.568809 kernel: audit: type=1300 audit(1707463224.032:1654): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bc1ca0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:20:24.568847 kernel: audit: type=1300 audit(1707463224.032:1653): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002de7520 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:20:24.032000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002de7520 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:20:24.032000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:20:24.783062 kernel: audit: type=1327 audit(1707463224.032:1655): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:20:24.783102 kernel: audit: type=1327 audit(1707463224.032:1654): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:20:24.032000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:20:24.876569 kernel: audit: type=1327 audit(1707463224.032:1653): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:20:24.032000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:20:24.969772 kernel: audit: type=1400 audit(1707463224.032:1656): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:24.032000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:20:24.032000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001c26000 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:20:24.032000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:20:42.959649 systemd[1]: Started sshd@24-139.178.90.101:22-74.121.149.150:54982.service. Feb 9 07:20:42.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.101:22-74.121.149.150:54982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:20:42.986573 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:20:42.986651 kernel: audit: type=1130 audit(1707463242.959:1657): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.101:22-74.121.149.150:54982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:20:47.157158 sshd[8749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.121.149.150 user=root Feb 9 07:20:47.156000 audit[8749]: USER_AUTH pid=8749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:20:47.254703 kernel: audit: type=1100 audit(1707463247.156:1658): pid=8749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:20:48.976007 sshd[8749]: Failed password for root from 74.121.149.150 port 54982 ssh2 Feb 9 07:20:49.356655 sshd[8749]: Received disconnect from 74.121.149.150 port 54982:11: Bye Bye [preauth] Feb 9 07:20:49.356655 sshd[8749]: Disconnected from authenticating user root 74.121.149.150 port 54982 [preauth] Feb 9 07:20:49.359359 systemd[1]: sshd@24-139.178.90.101:22-74.121.149.150:54982.service: Deactivated successfully. Feb 9 07:20:49.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.101:22-74.121.149.150:54982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:20:49.450544 kernel: audit: type=1131 audit(1707463249.359:1659): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.101:22-74.121.149.150:54982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:21:15.877000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:21:15.877000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001c77ac0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:21:16.071850 kernel: audit: type=1400 audit(1707463275.877:1660): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:21:16.071926 kernel: audit: type=1300 audit(1707463275.877:1660): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001c77ac0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:21:16.071944 kernel: audit: type=1327 audit(1707463275.877:1660): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:21:15.877000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:21:16.167153 kernel: audit: type=1400 audit(1707463276.069:1661): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:21:16.069000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:21:16.262112 kernel: audit: type=1300 audit(1707463276.069:1661): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019c3240 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:21:16.069000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019c3240 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:21:16.360720 kernel: audit: type=1327 audit(1707463276.069:1661): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:21:16.069000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:21:19.887000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:19.887000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a9e870 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:21:20.103496 kernel: audit: type=1400 audit(1707463279.887:1662): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:20.103532 kernel: audit: type=1300 audit(1707463279.887:1662): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a9e870 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:21:20.103548 kernel: audit: type=1327 audit(1707463279.887:1662): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:21:19.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:21:20.196519 kernel: audit: type=1400 audit(1707463279.887:1663): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:19.887000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:19.887000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ccd120 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:21:19.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:21:19.939000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:19.939000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0019753a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:21:19.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:21:19.939000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:19.939000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00424c360 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:21:19.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:21:19.940000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:19.940000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006430bd0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:21:19.940000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:21:19.940000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:19.940000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c013282840 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:21:19.940000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:21:19.940000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:19.940000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c009fa6ed0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:21:19.940000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:21:19.979000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:19.979000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0135a6a20 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:21:19.979000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:21:24.032000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:24.060617 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 07:21:24.060670 kernel: audit: type=1400 audit(1707463284.032:1670): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:24.032000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ccd5e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:21:24.270102 kernel: audit: type=1300 audit(1707463284.032:1670): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ccd5e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:21:24.270169 kernel: audit: type=1327 audit(1707463284.032:1670): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:21:24.032000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:21:24.032000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:24.453752 kernel: audit: type=1400 audit(1707463284.032:1671): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:24.453817 kernel: audit: type=1300 audit(1707463284.032:1671): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017a05e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:21:24.032000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017a05e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:21:24.574969 kernel: audit: type=1327 audit(1707463284.032:1671): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:21:24.032000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:21:24.032000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:24.758430 kernel: audit: type=1400 audit(1707463284.032:1672): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:24.758461 kernel: audit: type=1300 audit(1707463284.032:1672): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0013625e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:21:24.032000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0013625e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:21:24.879054 kernel: audit: type=1327 audit(1707463284.032:1672): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:21:24.032000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:21:24.972366 kernel: audit: type=1400 audit(1707463284.032:1673): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:24.032000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:21:24.032000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c26040 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:21:24.032000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:22:15.879000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:22:15.907439 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:22:15.907484 kernel: audit: type=1400 audit(1707463335.879:1674): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:22:15.879000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001e0f9e0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:22:16.003591 kernel: audit: type=1300 audit(1707463335.879:1674): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001e0f9e0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:22:15.879000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:22:16.192562 kernel: audit: type=1327 audit(1707463335.879:1674): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:22:16.192598 kernel: audit: type=1400 audit(1707463336.070:1675): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:22:16.070000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:22:16.070000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a2a100 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:22:16.383247 kernel: audit: type=1300 audit(1707463336.070:1675): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a2a100 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:22:16.383291 kernel: audit: type=1327 audit(1707463336.070:1675): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:22:16.070000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:22:19.889000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:19.889000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc0b80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:22:20.109835 kernel: audit: type=1400 audit(1707463339.889:1676): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:20.109880 kernel: audit: type=1300 audit(1707463339.889:1676): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc0b80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:22:20.109950 kernel: audit: type=1327 audit(1707463339.889:1676): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:22:19.889000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:22:19.889000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:20.294491 kernel: audit: type=1400 audit(1707463339.889:1677): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:19.889000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00165a8d0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:22:19.889000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:22:19.941000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:19.941000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00faee040 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:22:19.941000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:22:19.941000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:19.941000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00e57e090 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:22:19.941000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:22:19.942000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:19.942000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c010bfa7a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:22:19.942000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:22:19.942000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:19.942000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00e57e120 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:22:19.942000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:22:19.942000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:19.942000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c009524cc0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:22:19.942000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:22:19.980000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:19.980000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0142fcf90 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:22:19.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:22:24.034000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:24.062085 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 07:22:24.062145 kernel: audit: type=1400 audit(1707463344.034:1684): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:24.151569 kernel: audit: type=1300 audit(1707463344.034:1684): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b4e2e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:22:24.034000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b4e2e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:22:24.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:22:24.363300 kernel: audit: type=1327 audit(1707463344.034:1684): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:22:24.363366 kernel: audit: type=1400 audit(1707463344.034:1685): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:24.034000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:24.034000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c263c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:22:24.573068 kernel: audit: type=1300 audit(1707463344.034:1685): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c263c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:22:24.573120 kernel: audit: type=1327 audit(1707463344.034:1685): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:22:24.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:22:24.666437 kernel: audit: type=1400 audit(1707463344.034:1686): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:24.034000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:24.756523 kernel: audit: type=1300 audit(1707463344.034:1686): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b4e300 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:22:24.034000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b4e300 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:22:24.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:22:24.878581 kernel: audit: type=1327 audit(1707463344.034:1686): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:22:24.034000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:25.061219 kernel: audit: type=1400 audit(1707463344.034:1687): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:22:24.034000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001363680 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:22:24.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:23:15.879000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:23:15.922528 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:23:15.922610 kernel: audit: type=1400 audit(1707463395.879:1688): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:23:15.879000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001e3c7a0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:23:16.113798 kernel: audit: type=1300 audit(1707463395.879:1688): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001e3c7a0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:23:16.113827 kernel: audit: type=1327 audit(1707463395.879:1688): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:23:15.879000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:23:16.070000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:23:16.302477 kernel: audit: type=1400 audit(1707463396.070:1689): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:23:16.302583 kernel: audit: type=1300 audit(1707463396.070:1689): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001457de0 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:23:16.070000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001457de0 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:23:16.070000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:23:16.493305 kernel: audit: type=1327 audit(1707463396.070:1689): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:23:18.364295 systemd[1]: Started sshd@25-139.178.90.101:22-74.121.149.150:55100.service. Feb 9 07:23:18.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.101:22-74.121.149.150:55100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:23:18.455660 kernel: audit: type=1130 audit(1707463398.362:1690): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.101:22-74.121.149.150:55100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:23:19.365376 sshd[9281]: Invalid user system from 74.121.149.150 port 55100 Feb 9 07:23:19.371521 sshd[9281]: pam_faillock(sshd:auth): User unknown Feb 9 07:23:19.372638 sshd[9281]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:23:19.372725 sshd[9281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.121.149.150 Feb 9 07:23:19.373576 sshd[9281]: pam_faillock(sshd:auth): User unknown Feb 9 07:23:19.372000 audit[9281]: USER_AUTH pid=9281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="system" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:23:19.465572 kernel: audit: type=1100 audit(1707463399.372:1691): pid=9281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="system" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:23:19.889000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:19.889000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cf5ad0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:23:20.107243 kernel: audit: type=1400 audit(1707463399.889:1692): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:20.107279 kernel: audit: type=1300 audit(1707463399.889:1692): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cf5ad0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:23:19.889000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:23:19.889000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:19.889000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002de7240 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:23:19.889000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:23:19.940000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:19.940000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c005604d50 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:23:19.940000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:23:19.940000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:19.940000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0134048a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:23:19.940000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:23:19.941000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:19.941000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c012484510 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:23:19.941000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:23:19.941000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:19.941000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c012484540 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:23:19.941000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:23:19.941000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:19.941000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c008fb22a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:23:19.941000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:23:19.980000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:19.980000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01351b500 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:23:19.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:23:21.392942 sshd[9281]: Failed password for invalid user system from 74.121.149.150 port 55100 ssh2 Feb 9 07:23:21.656892 sshd[9281]: Received disconnect from 74.121.149.150 port 55100:11: Bye Bye [preauth] Feb 9 07:23:21.656892 sshd[9281]: Disconnected from invalid user system 74.121.149.150 port 55100 [preauth] Feb 9 07:23:21.659483 systemd[1]: sshd@25-139.178.90.101:22-74.121.149.150:55100.service: Deactivated successfully. Feb 9 07:23:21.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.101:22-74.121.149.150:55100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:23:21.687295 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 9 07:23:21.687332 kernel: audit: type=1131 audit(1707463401.658:1700): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.101:22-74.121.149.150:55100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:23:24.034000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:24.034000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0002c3a80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:23:24.245181 kernel: audit: type=1400 audit(1707463404.034:1701): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:24.245236 kernel: audit: type=1300 audit(1707463404.034:1701): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0002c3a80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:23:24.245256 kernel: audit: type=1327 audit(1707463404.034:1701): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:23:24.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:23:24.034000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:24.428161 kernel: audit: type=1400 audit(1707463404.034:1702): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:24.428227 kernel: audit: type=1300 audit(1707463404.034:1702): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b22f80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:23:24.034000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b22f80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:23:24.549062 kernel: audit: type=1327 audit(1707463404.034:1702): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:23:24.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:23:24.034000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:24.643560 kernel: audit: type=1400 audit(1707463404.034:1703): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:24.034000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009d1bc0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:23:24.853982 kernel: audit: type=1300 audit(1707463404.034:1703): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009d1bc0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:23:24.854036 kernel: audit: type=1327 audit(1707463404.034:1703): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:23:24.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:23:24.034000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:23:24.034000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc0d80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:23:24.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:24:15.881000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:24:15.909512 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 07:24:15.909626 kernel: audit: type=1400 audit(1707463455.881:1705): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:24:15.881000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012e40c0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:24:16.100786 kernel: audit: type=1300 audit(1707463455.881:1705): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012e40c0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:24:16.100835 kernel: audit: type=1327 audit(1707463455.881:1705): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:24:15.881000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:24:16.071000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:24:16.290183 kernel: audit: type=1400 audit(1707463456.071:1706): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:24:16.290245 kernel: audit: type=1300 audit(1707463456.071:1706): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001afc280 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:24:16.071000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001afc280 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:24:16.388256 kernel: audit: type=1327 audit(1707463456.071:1706): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:24:16.071000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:24:19.890000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:19.890000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012cdf50 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:24:20.109998 kernel: audit: type=1400 audit(1707463459.890:1707): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:20.110050 kernel: audit: type=1300 audit(1707463459.890:1707): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012cdf50 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:24:20.110068 kernel: audit: type=1327 audit(1707463459.890:1707): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:24:19.890000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:24:19.890000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:20.204581 kernel: audit: type=1400 audit(1707463459.890:1708): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:19.890000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b4e900 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:24:19.890000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:24:19.942000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:19.942000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c013f02000 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:24:19.942000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:24:19.942000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:19.942000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c010c81560 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:24:19.942000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:24:19.943000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:19.943000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00f797940 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:24:19.943000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:24:19.943000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:19.943000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:19.943000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c010c815f0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:24:19.943000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:24:19.943000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c008719200 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:24:19.943000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:24:19.982000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:19.982000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0139ce750 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:24:19.982000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:24:24.035000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:24.063259 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 07:24:24.063301 kernel: audit: type=1400 audit(1707463464.035:1715): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:24.035000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b4eb80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:24:24.272113 kernel: audit: type=1300 audit(1707463464.035:1715): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b4eb80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:24:24.272198 kernel: audit: type=1327 audit(1707463464.035:1715): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:24:24.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:24:24.035000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:24.453992 kernel: audit: type=1400 audit(1707463464.035:1716): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:24.454045 kernel: audit: type=1300 audit(1707463464.035:1716): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002af9360 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:24:24.035000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002af9360 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:24:24.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:24:24.667401 kernel: audit: type=1327 audit(1707463464.035:1716): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:24:24.667470 kernel: audit: type=1400 audit(1707463464.035:1717): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:24.035000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:24.757410 kernel: audit: type=1300 audit(1707463464.035:1717): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ccd120 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:24:24.035000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ccd120 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:24:24.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:24:24.970894 kernel: audit: type=1327 audit(1707463464.035:1717): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:24:24.970937 kernel: audit: type=1400 audit(1707463464.035:1718): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:24.035000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:24:24.035000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002af9380 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:24:24.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:25:11.587389 systemd[1]: Started sshd@26-139.178.90.101:22-141.98.11.11:62084.service. Feb 9 07:25:11.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.101:22-141.98.11.11:62084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:11.614777 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:25:11.614871 kernel: audit: type=1130 audit(1707463511.586:1719): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.101:22-141.98.11.11:62084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:13.427449 sshd[9704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.11 user=root Feb 9 07:25:13.427000 audit[9704]: USER_AUTH pid=9704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 9 07:25:13.516498 kernel: audit: type=1100 audit(1707463513.427:1720): pid=9704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 9 07:25:15.763209 sshd[9704]: Failed password for root from 141.98.11.11 port 62084 ssh2 Feb 9 07:25:15.882000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:25:15.882000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001e3da60 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:25:16.076513 kernel: audit: type=1400 audit(1707463515.882:1721): avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:25:16.076599 kernel: audit: type=1300 audit(1707463515.882:1721): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001e3da60 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:25:16.076618 kernel: audit: type=1327 audit(1707463515.882:1721): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:25:15.882000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:25:16.072000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:25:16.266141 kernel: audit: type=1400 audit(1707463516.072:1722): avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:25:16.266171 kernel: audit: type=1300 audit(1707463516.072:1722): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001ad7260 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:25:16.072000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001ad7260 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:25:16.362741 kernel: audit: type=1327 audit(1707463516.072:1722): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:25:16.072000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:25:17.556082 sshd[9704]: Connection closed by authenticating user root 141.98.11.11 port 62084 [preauth] Feb 9 07:25:17.558603 systemd[1]: sshd@26-139.178.90.101:22-141.98.11.11:62084.service: Deactivated successfully. Feb 9 07:25:17.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.101:22-141.98.11.11:62084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:17.650563 kernel: audit: type=1131 audit(1707463517.558:1723): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.101:22-141.98.11.11:62084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:19.891000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:19.891000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a9fd40 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:25:20.105949 kernel: audit: type=1400 audit(1707463519.891:1724): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:20.105987 kernel: audit: type=1300 audit(1707463519.891:1724): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a9fd40 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:25:20.106004 kernel: audit: type=1327 audit(1707463519.891:1724): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:25:19.891000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:25:20.199299 kernel: audit: type=1400 audit(1707463519.891:1725): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:19.891000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:20.289419 kernel: audit: type=1300 audit(1707463519.891:1725): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c278c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:25:19.891000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c278c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:25:20.410510 kernel: audit: type=1327 audit(1707463519.891:1725): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:25:19.891000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:25:19.942000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:20.596083 kernel: audit: type=1400 audit(1707463519.942:1726): avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:20.596114 kernel: audit: type=1300 audit(1707463519.942:1726): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0132833a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:25:19.942000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0132833a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:25:20.695553 kernel: audit: type=1327 audit(1707463519.942:1726): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:25:19.942000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:25:19.942000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:19.942000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0069786f0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:25:19.942000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:25:19.943000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:19.943000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006978750 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:25:19.943000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:25:19.944000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:19.944000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c009d88e80 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:25:19.944000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:25:19.944000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:19.944000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f888900 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:25:19.944000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:25:19.982000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:19.982000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00f888960 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:25:19.982000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:25:24.036000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:24.064063 kernel: kauditd_printk_skb: 15 callbacks suppressed Feb 9 07:25:24.064123 kernel: audit: type=1400 audit(1707463524.036:1732): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:24.036000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c27e80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:25:24.274911 kernel: audit: type=1300 audit(1707463524.036:1732): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c27e80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:25:24.274988 kernel: audit: type=1327 audit(1707463524.036:1732): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:25:24.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:25:24.368361 kernel: audit: type=1400 audit(1707463524.036:1734): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:24.036000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:24.036000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:24.548901 kernel: audit: type=1400 audit(1707463524.036:1733): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:24.548938 kernel: audit: type=1300 audit(1707463524.036:1733): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ea81c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:25:24.036000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ea81c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:25:24.036000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001abb6e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:25:24.790377 kernel: audit: type=1300 audit(1707463524.036:1734): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001abb6e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:25:24.790419 kernel: audit: type=1327 audit(1707463524.036:1733): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:25:24.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:25:24.883958 kernel: audit: type=1327 audit(1707463524.036:1734): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:25:24.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:25:24.977581 kernel: audit: type=1400 audit(1707463524.036:1735): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:24.036000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:25:24.036000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0016370a0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:25:24.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:25:41.155213 systemd[1]: Started sshd@27-139.178.90.101:22-147.75.109.163:36276.service. Feb 9 07:25:41.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.101:22-147.75.109.163:36276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:41.182841 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:25:41.182914 kernel: audit: type=1130 audit(1707463541.154:1736): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.101:22-147.75.109.163:36276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:41.206017 sshd[9827]: Accepted publickey for core from 147.75.109.163 port 36276 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:25:41.207280 sshd[9827]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:25:41.211100 systemd-logind[1462]: New session 10 of user core. Feb 9 07:25:41.211704 systemd[1]: Started session-10.scope. Feb 9 07:25:41.204000 audit[9827]: USER_ACCT pid=9827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:41.296960 sshd[9827]: pam_unix(sshd:session): session closed for user core Feb 9 07:25:41.298273 systemd[1]: sshd@27-139.178.90.101:22-147.75.109.163:36276.service: Deactivated successfully. Feb 9 07:25:41.298730 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 07:25:41.299092 systemd-logind[1462]: Session 10 logged out. Waiting for processes to exit. Feb 9 07:25:41.299482 systemd-logind[1462]: Removed session 10. Feb 9 07:25:41.365127 kernel: audit: type=1101 audit(1707463541.204:1737): pid=9827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:41.365166 kernel: audit: type=1103 audit(1707463541.205:1738): pid=9827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:41.205000 audit[9827]: CRED_ACQ pid=9827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:41.455774 kernel: audit: type=1006 audit(1707463541.205:1739): pid=9827 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 07:25:41.514398 kernel: audit: type=1300 audit(1707463541.205:1739): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee0b29ac0 a2=3 a3=0 items=0 ppid=1 pid=9827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:25:41.205000 audit[9827]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee0b29ac0 a2=3 a3=0 items=0 ppid=1 pid=9827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:25:41.607035 kernel: audit: type=1327 audit(1707463541.205:1739): proctitle=737368643A20636F7265205B707269765D Feb 9 07:25:41.205000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:25:41.637848 kernel: audit: type=1105 audit(1707463541.212:1740): pid=9827 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:41.212000 audit[9827]: USER_START pid=9827 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:41.733344 kernel: audit: type=1103 audit(1707463541.213:1741): pid=9829 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:41.213000 audit[9829]: CRED_ACQ pid=9829 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:41.822653 kernel: audit: type=1106 audit(1707463541.296:1742): pid=9827 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:41.296000 audit[9827]: USER_END pid=9827 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:41.296000 audit[9827]: CRED_DISP pid=9827 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:42.007981 kernel: audit: type=1104 audit(1707463541.296:1743): pid=9827 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:41.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.101:22-147.75.109.163:36276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:46.306818 systemd[1]: Started sshd@28-139.178.90.101:22-147.75.109.163:42884.service. Feb 9 07:25:46.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.101:22-147.75.109.163:42884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:46.333871 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:25:46.333934 kernel: audit: type=1130 audit(1707463546.305:1745): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.101:22-147.75.109.163:42884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:46.444000 audit[9855]: USER_ACCT pid=9855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:46.445996 sshd[9855]: Accepted publickey for core from 147.75.109.163 port 42884 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:25:46.446600 sshd[9855]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:25:46.449405 systemd-logind[1462]: New session 11 of user core. Feb 9 07:25:46.449972 systemd[1]: Started session-11.scope. Feb 9 07:25:46.530817 sshd[9855]: pam_unix(sshd:session): session closed for user core Feb 9 07:25:46.532284 systemd[1]: sshd@28-139.178.90.101:22-147.75.109.163:42884.service: Deactivated successfully. Feb 9 07:25:46.532801 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 07:25:46.533181 systemd-logind[1462]: Session 11 logged out. Waiting for processes to exit. Feb 9 07:25:46.533653 systemd-logind[1462]: Removed session 11. Feb 9 07:25:46.444000 audit[9855]: CRED_ACQ pid=9855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:46.629567 kernel: audit: type=1101 audit(1707463546.444:1746): pid=9855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:46.629615 kernel: audit: type=1103 audit(1707463546.444:1747): pid=9855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:46.629632 kernel: audit: type=1006 audit(1707463546.444:1748): pid=9855 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 07:25:46.444000 audit[9855]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff002711a0 a2=3 a3=0 items=0 ppid=1 pid=9855 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:25:46.779582 kernel: audit: type=1300 audit(1707463546.444:1748): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff002711a0 a2=3 a3=0 items=0 ppid=1 pid=9855 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:25:46.779615 kernel: audit: type=1327 audit(1707463546.444:1748): proctitle=737368643A20636F7265205B707269765D Feb 9 07:25:46.444000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:25:46.810119 kernel: audit: type=1105 audit(1707463546.450:1749): pid=9855 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:46.450000 audit[9855]: USER_START pid=9855 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:46.904689 kernel: audit: type=1103 audit(1707463546.451:1750): pid=9857 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:46.451000 audit[9857]: CRED_ACQ pid=9857 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:46.993921 kernel: audit: type=1106 audit(1707463546.530:1751): pid=9855 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:46.530000 audit[9855]: USER_END pid=9855 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:46.530000 audit[9855]: CRED_DISP pid=9855 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:47.089509 kernel: audit: type=1104 audit(1707463546.530:1752): pid=9855 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:46.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.101:22-147.75.109.163:42884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:51.540738 systemd[1]: Started sshd@29-139.178.90.101:22-147.75.109.163:42888.service. Feb 9 07:25:51.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.101:22-147.75.109.163:42888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:51.567802 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:25:51.567867 kernel: audit: type=1130 audit(1707463551.539:1754): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.101:22-147.75.109.163:42888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:51.679000 audit[9909]: USER_ACCT pid=9909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:51.681616 sshd[9909]: Accepted publickey for core from 147.75.109.163 port 42888 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:25:51.682816 sshd[9909]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:25:51.685309 systemd-logind[1462]: New session 12 of user core. Feb 9 07:25:51.685942 systemd[1]: Started session-12.scope. Feb 9 07:25:51.766400 sshd[9909]: pam_unix(sshd:session): session closed for user core Feb 9 07:25:51.767905 systemd[1]: sshd@29-139.178.90.101:22-147.75.109.163:42888.service: Deactivated successfully. Feb 9 07:25:51.768370 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 07:25:51.768712 systemd-logind[1462]: Session 12 logged out. Waiting for processes to exit. Feb 9 07:25:51.769182 systemd-logind[1462]: Removed session 12. Feb 9 07:25:51.681000 audit[9909]: CRED_ACQ pid=9909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:51.863363 kernel: audit: type=1101 audit(1707463551.679:1755): pid=9909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:51.863415 kernel: audit: type=1103 audit(1707463551.681:1756): pid=9909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:51.863432 kernel: audit: type=1006 audit(1707463551.681:1757): pid=9909 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 07:25:51.921991 kernel: audit: type=1300 audit(1707463551.681:1757): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc022f56b0 a2=3 a3=0 items=0 ppid=1 pid=9909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:25:51.681000 audit[9909]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc022f56b0 a2=3 a3=0 items=0 ppid=1 pid=9909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:25:51.681000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:25:52.044578 kernel: audit: type=1327 audit(1707463551.681:1757): proctitle=737368643A20636F7265205B707269765D Feb 9 07:25:51.686000 audit[9909]: USER_START pid=9909 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:52.139166 kernel: audit: type=1105 audit(1707463551.686:1758): pid=9909 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:52.139199 kernel: audit: type=1103 audit(1707463551.687:1759): pid=9911 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:51.687000 audit[9911]: CRED_ACQ pid=9911 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:52.228554 kernel: audit: type=1106 audit(1707463551.765:1760): pid=9909 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:51.765000 audit[9909]: USER_END pid=9909 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:52.324097 kernel: audit: type=1104 audit(1707463551.765:1761): pid=9909 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:51.765000 audit[9909]: CRED_DISP pid=9909 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:51.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.101:22-147.75.109.163:42888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:54.056976 systemd[1]: Started sshd@30-139.178.90.101:22-74.121.149.150:55226.service. Feb 9 07:25:54.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.101:22-74.121.149.150:55226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:56.776748 systemd[1]: Started sshd@31-139.178.90.101:22-147.75.109.163:57198.service. Feb 9 07:25:56.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.101:22-147.75.109.163:57198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:56.803646 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:25:56.803699 kernel: audit: type=1130 audit(1707463556.775:1764): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.101:22-147.75.109.163:57198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:56.915000 audit[9977]: USER_ACCT pid=9977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:56.917189 sshd[9977]: Accepted publickey for core from 147.75.109.163 port 57198 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:25:56.918730 sshd[9977]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:25:56.924415 systemd-logind[1462]: New session 13 of user core. Feb 9 07:25:56.928310 systemd[1]: Started session-13.scope. Feb 9 07:25:56.916000 audit[9977]: CRED_ACQ pid=9977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:57.009463 sshd[9977]: pam_unix(sshd:session): session closed for user core Feb 9 07:25:57.010960 systemd[1]: sshd@31-139.178.90.101:22-147.75.109.163:57198.service: Deactivated successfully. Feb 9 07:25:57.011414 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 07:25:57.011849 systemd-logind[1462]: Session 13 logged out. Waiting for processes to exit. Feb 9 07:25:57.012378 systemd-logind[1462]: Removed session 13. Feb 9 07:25:57.099090 kernel: audit: type=1101 audit(1707463556.915:1765): pid=9977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:57.099136 kernel: audit: type=1103 audit(1707463556.916:1766): pid=9977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:57.099154 kernel: audit: type=1006 audit(1707463556.916:1767): pid=9977 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 07:25:56.916000 audit[9977]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9f7552e0 a2=3 a3=0 items=0 ppid=1 pid=9977 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:25:57.249682 kernel: audit: type=1300 audit(1707463556.916:1767): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9f7552e0 a2=3 a3=0 items=0 ppid=1 pid=9977 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:25:57.249713 kernel: audit: type=1327 audit(1707463556.916:1767): proctitle=737368643A20636F7265205B707269765D Feb 9 07:25:56.916000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:25:57.280211 kernel: audit: type=1105 audit(1707463556.929:1768): pid=9977 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:56.929000 audit[9977]: USER_START pid=9977 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:57.374697 kernel: audit: type=1103 audit(1707463556.930:1769): pid=9979 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:56.930000 audit[9979]: CRED_ACQ pid=9979 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:57.463936 kernel: audit: type=1106 audit(1707463557.008:1770): pid=9977 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:57.008000 audit[9977]: USER_END pid=9977 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:57.008000 audit[9977]: CRED_DISP pid=9977 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:57.648767 kernel: audit: type=1104 audit(1707463557.008:1771): pid=9977 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:25:57.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.101:22-147.75.109.163:57198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:25:58.967452 sshd[9970]: Invalid user yz from 74.121.149.150 port 55226 Feb 9 07:25:58.973872 sshd[9970]: pam_faillock(sshd:auth): User unknown Feb 9 07:25:58.974956 sshd[9970]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:25:58.975060 sshd[9970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.121.149.150 Feb 9 07:25:58.975991 sshd[9970]: pam_faillock(sshd:auth): User unknown Feb 9 07:25:58.974000 audit[9970]: USER_AUTH pid=9970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yz" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:26:01.156034 sshd[9970]: Failed password for invalid user yz from 74.121.149.150 port 55226 ssh2 Feb 9 07:26:01.457609 sshd[9970]: Received disconnect from 74.121.149.150 port 55226:11: Bye Bye [preauth] Feb 9 07:26:01.457609 sshd[9970]: Disconnected from invalid user yz 74.121.149.150 port 55226 [preauth] Feb 9 07:26:01.460103 systemd[1]: sshd@30-139.178.90.101:22-74.121.149.150:55226.service: Deactivated successfully. Feb 9 07:26:01.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.101:22-74.121.149.150:55226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:02.019915 systemd[1]: Started sshd@32-139.178.90.101:22-147.75.109.163:57204.service. Feb 9 07:26:02.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.101:22-147.75.109.163:57204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:02.047119 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 07:26:02.047229 kernel: audit: type=1130 audit(1707463562.018:1775): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.101:22-147.75.109.163:57204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:02.158000 audit[10005]: USER_ACCT pid=10005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:02.160066 sshd[10005]: Accepted publickey for core from 147.75.109.163 port 57204 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:26:02.161805 sshd[10005]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:26:02.164545 systemd-logind[1462]: New session 14 of user core. Feb 9 07:26:02.165190 systemd[1]: Started session-14.scope. Feb 9 07:26:02.246553 sshd[10005]: pam_unix(sshd:session): session closed for user core Feb 9 07:26:02.248070 systemd[1]: sshd@32-139.178.90.101:22-147.75.109.163:57204.service: Deactivated successfully. Feb 9 07:26:02.248526 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 07:26:02.248924 systemd-logind[1462]: Session 14 logged out. Waiting for processes to exit. Feb 9 07:26:02.249402 systemd-logind[1462]: Removed session 14. Feb 9 07:26:02.160000 audit[10005]: CRED_ACQ pid=10005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:02.341957 kernel: audit: type=1101 audit(1707463562.158:1776): pid=10005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:02.341995 kernel: audit: type=1103 audit(1707463562.160:1777): pid=10005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:02.342011 kernel: audit: type=1006 audit(1707463562.160:1778): pid=10005 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 07:26:02.400581 kernel: audit: type=1300 audit(1707463562.160:1778): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffed620740 a2=3 a3=0 items=0 ppid=1 pid=10005 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:02.160000 audit[10005]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffed620740 a2=3 a3=0 items=0 ppid=1 pid=10005 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:02.160000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:02.523108 kernel: audit: type=1327 audit(1707463562.160:1778): proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:02.523137 kernel: audit: type=1105 audit(1707463562.165:1779): pid=10005 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:02.165000 audit[10005]: USER_START pid=10005 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:02.166000 audit[10007]: CRED_ACQ pid=10007 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:02.706820 kernel: audit: type=1103 audit(1707463562.166:1780): pid=10007 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:02.706847 kernel: audit: type=1106 audit(1707463562.245:1781): pid=10005 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:02.245000 audit[10005]: USER_END pid=10005 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:02.802348 kernel: audit: type=1104 audit(1707463562.245:1782): pid=10005 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:02.245000 audit[10005]: CRED_DISP pid=10005 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:02.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.101:22-147.75.109.163:57204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:07.256748 systemd[1]: Started sshd@33-139.178.90.101:22-147.75.109.163:39930.service. Feb 9 07:26:07.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.101:22-147.75.109.163:39930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:07.283659 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:26:07.283742 kernel: audit: type=1130 audit(1707463567.255:1784): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.101:22-147.75.109.163:39930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:07.394000 audit[10053]: USER_ACCT pid=10053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:07.396221 sshd[10053]: Accepted publickey for core from 147.75.109.163 port 39930 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:26:07.397571 sshd[10053]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:26:07.400161 systemd-logind[1462]: New session 15 of user core. Feb 9 07:26:07.400815 systemd[1]: Started session-15.scope. Feb 9 07:26:07.480172 sshd[10053]: pam_unix(sshd:session): session closed for user core Feb 9 07:26:07.481600 systemd[1]: sshd@33-139.178.90.101:22-147.75.109.163:39930.service: Deactivated successfully. Feb 9 07:26:07.482067 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 07:26:07.482362 systemd-logind[1462]: Session 15 logged out. Waiting for processes to exit. Feb 9 07:26:07.482867 systemd-logind[1462]: Removed session 15. Feb 9 07:26:07.487573 kernel: audit: type=1101 audit(1707463567.394:1785): pid=10053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:07.487610 kernel: audit: type=1103 audit(1707463567.395:1786): pid=10053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:07.395000 audit[10053]: CRED_ACQ pid=10053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:07.636710 kernel: audit: type=1006 audit(1707463567.395:1787): pid=10053 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 07:26:07.636761 kernel: audit: type=1300 audit(1707463567.395:1787): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc52c2bda0 a2=3 a3=0 items=0 ppid=1 pid=10053 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:07.395000 audit[10053]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc52c2bda0 a2=3 a3=0 items=0 ppid=1 pid=10053 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:07.728701 kernel: audit: type=1327 audit(1707463567.395:1787): proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:07.395000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:07.759225 kernel: audit: type=1105 audit(1707463567.401:1788): pid=10053 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:07.401000 audit[10053]: USER_START pid=10053 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:07.853679 kernel: audit: type=1103 audit(1707463567.402:1789): pid=10055 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:07.402000 audit[10055]: CRED_ACQ pid=10055 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:07.479000 audit[10053]: USER_END pid=10053 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:08.038468 kernel: audit: type=1106 audit(1707463567.479:1790): pid=10053 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:08.038544 kernel: audit: type=1104 audit(1707463567.479:1791): pid=10053 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:07.479000 audit[10053]: CRED_DISP pid=10053 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:07.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.101:22-147.75.109.163:39930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:12.489890 systemd[1]: Started sshd@34-139.178.90.101:22-147.75.109.163:39940.service. Feb 9 07:26:12.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.101:22-147.75.109.163:39940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:12.516918 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:26:12.516970 kernel: audit: type=1130 audit(1707463572.488:1793): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.101:22-147.75.109.163:39940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:12.628000 audit[10099]: USER_ACCT pid=10099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:12.630228 sshd[10099]: Accepted publickey for core from 147.75.109.163 port 39940 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:26:12.632602 sshd[10099]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:26:12.638284 systemd-logind[1462]: New session 16 of user core. Feb 9 07:26:12.638847 systemd[1]: Started session-16.scope. Feb 9 07:26:12.630000 audit[10099]: CRED_ACQ pid=10099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:12.814422 kernel: audit: type=1101 audit(1707463572.628:1794): pid=10099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:12.814489 kernel: audit: type=1103 audit(1707463572.630:1795): pid=10099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:12.814522 kernel: audit: type=1006 audit(1707463572.630:1796): pid=10099 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 07:26:12.851859 sshd[10099]: pam_unix(sshd:session): session closed for user core Feb 9 07:26:12.853297 systemd[1]: sshd@34-139.178.90.101:22-147.75.109.163:39940.service: Deactivated successfully. Feb 9 07:26:12.853766 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 07:26:12.854113 systemd-logind[1462]: Session 16 logged out. Waiting for processes to exit. Feb 9 07:26:12.854769 systemd-logind[1462]: Removed session 16. Feb 9 07:26:12.630000 audit[10099]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6db49820 a2=3 a3=0 items=0 ppid=1 pid=10099 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:12.873529 kernel: audit: type=1300 audit(1707463572.630:1796): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6db49820 a2=3 a3=0 items=0 ppid=1 pid=10099 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:12.630000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:12.995778 kernel: audit: type=1327 audit(1707463572.630:1796): proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:12.995814 kernel: audit: type=1105 audit(1707463572.639:1797): pid=10099 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:12.639000 audit[10099]: USER_START pid=10099 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:13.090279 kernel: audit: type=1103 audit(1707463572.640:1798): pid=10101 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:12.640000 audit[10101]: CRED_ACQ pid=10101 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:13.179573 kernel: audit: type=1106 audit(1707463572.851:1799): pid=10099 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:12.851000 audit[10099]: USER_END pid=10099 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:12.851000 audit[10099]: CRED_DISP pid=10099 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:13.364455 kernel: audit: type=1104 audit(1707463572.851:1800): pid=10099 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:12.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.101:22-147.75.109.163:39940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:15.882000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:26:15.882000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001ad18c0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:26:15.882000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:26:16.072000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:26:16.072000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001d09b80 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:26:16.072000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:26:17.864111 systemd[1]: Started sshd@35-139.178.90.101:22-147.75.109.163:52262.service. Feb 9 07:26:17.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.101:22-147.75.109.163:52262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:17.891465 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 07:26:17.891544 kernel: audit: type=1130 audit(1707463577.863:1804): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.101:22-147.75.109.163:52262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:18.003000 audit[10125]: USER_ACCT pid=10125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:18.004945 sshd[10125]: Accepted publickey for core from 147.75.109.163 port 52262 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:26:18.007528 sshd[10125]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:26:18.009999 systemd-logind[1462]: New session 17 of user core. Feb 9 07:26:18.010623 systemd[1]: Started session-17.scope. Feb 9 07:26:18.090264 sshd[10125]: pam_unix(sshd:session): session closed for user core Feb 9 07:26:18.091638 systemd[1]: sshd@35-139.178.90.101:22-147.75.109.163:52262.service: Deactivated successfully. Feb 9 07:26:18.092095 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 07:26:18.092374 systemd-logind[1462]: Session 17 logged out. Waiting for processes to exit. Feb 9 07:26:18.092941 systemd-logind[1462]: Removed session 17. Feb 9 07:26:18.005000 audit[10125]: CRED_ACQ pid=10125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:18.186944 kernel: audit: type=1101 audit(1707463578.003:1805): pid=10125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:18.186982 kernel: audit: type=1103 audit(1707463578.005:1806): pid=10125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:18.187001 kernel: audit: type=1006 audit(1707463578.005:1807): pid=10125 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 07:26:18.005000 audit[10125]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd85b34590 a2=3 a3=0 items=0 ppid=1 pid=10125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:18.337698 kernel: audit: type=1300 audit(1707463578.005:1807): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd85b34590 a2=3 a3=0 items=0 ppid=1 pid=10125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:18.337741 kernel: audit: type=1327 audit(1707463578.005:1807): proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:18.005000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:18.368209 kernel: audit: type=1105 audit(1707463578.011:1808): pid=10125 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:18.011000 audit[10125]: USER_START pid=10125 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:18.011000 audit[10127]: CRED_ACQ pid=10127 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:18.551989 kernel: audit: type=1103 audit(1707463578.011:1809): pid=10127 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:18.552027 kernel: audit: type=1106 audit(1707463578.089:1810): pid=10125 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:18.089000 audit[10125]: USER_END pid=10125 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:18.647580 kernel: audit: type=1104 audit(1707463578.089:1811): pid=10125 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:18.089000 audit[10125]: CRED_DISP pid=10125 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:18.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.101:22-147.75.109.163:52262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:19.891000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:26:19.891000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013c9e60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:26:19.891000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:26:19.891000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:26:19.891000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0007d13c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:26:19.891000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:26:19.942000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:26:19.942000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c010f3c840 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:26:19.942000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:26:19.942000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:26:19.942000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c006d5ec20 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:26:19.942000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:26:19.943000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:26:19.943000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c001975860 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:26:19.943000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:26:19.943000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:26:19.943000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:26:19.943000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00980e9c0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:26:19.943000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:26:19.943000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00557b2c0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:26:19.943000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:26:19.982000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:26:19.982000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c012182d80 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:26:19.982000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:26:23.099898 systemd[1]: Started sshd@36-139.178.90.101:22-147.75.109.163:52266.service. Feb 9 07:26:23.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.101:22-147.75.109.163:52266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:23.127070 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 07:26:23.127111 kernel: audit: type=1130 audit(1707463583.098:1821): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.101:22-147.75.109.163:52266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:23.236000 audit[10178]: USER_ACCT pid=10178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:23.238017 sshd[10178]: Accepted publickey for core from 147.75.109.163 port 52266 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:26:23.239797 sshd[10178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:26:23.242246 systemd-logind[1462]: New session 18 of user core. Feb 9 07:26:23.242742 systemd[1]: Started session-18.scope. Feb 9 07:26:23.322338 sshd[10178]: pam_unix(sshd:session): session closed for user core Feb 9 07:26:23.323791 systemd[1]: sshd@36-139.178.90.101:22-147.75.109.163:52266.service: Deactivated successfully. Feb 9 07:26:23.324242 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 07:26:23.324567 systemd-logind[1462]: Session 18 logged out. Waiting for processes to exit. Feb 9 07:26:23.325101 systemd-logind[1462]: Removed session 18. Feb 9 07:26:23.238000 audit[10178]: CRED_ACQ pid=10178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:23.420125 kernel: audit: type=1101 audit(1707463583.236:1822): pid=10178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:23.420159 kernel: audit: type=1103 audit(1707463583.238:1823): pid=10178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:23.420177 kernel: audit: type=1006 audit(1707463583.238:1824): pid=10178 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 9 07:26:23.478853 kernel: audit: type=1300 audit(1707463583.238:1824): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdca67d90 a2=3 a3=0 items=0 ppid=1 pid=10178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:23.238000 audit[10178]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdca67d90 a2=3 a3=0 items=0 ppid=1 pid=10178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:23.570923 kernel: audit: type=1327 audit(1707463583.238:1824): proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:23.238000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:23.601406 kernel: audit: type=1105 audit(1707463583.243:1825): pid=10178 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:23.243000 audit[10178]: USER_START pid=10178 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:23.695946 kernel: audit: type=1103 audit(1707463583.243:1826): pid=10180 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:23.243000 audit[10180]: CRED_ACQ pid=10180 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:23.785218 kernel: audit: type=1106 audit(1707463583.321:1827): pid=10178 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:23.321000 audit[10178]: USER_END pid=10178 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:23.321000 audit[10178]: CRED_DISP pid=10178 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:23.970166 kernel: audit: type=1104 audit(1707463583.321:1828): pid=10178 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:23.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.101:22-147.75.109.163:52266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:24.035000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:26:24.035000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001043040 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:26:24.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:26:24.035000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:26:24.035000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:26:24.035000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012e17a0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:26:24.035000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007d1680 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:26:24.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:26:24.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:26:24.035000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:26:24.035000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bc0600 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:26:24.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:26:28.327722 systemd[1]: Started sshd@37-139.178.90.101:22-147.75.109.163:38936.service. Feb 9 07:26:28.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.101:22-147.75.109.163:38936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:28.355078 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 07:26:28.355147 kernel: audit: type=1130 audit(1707463588.326:1834): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.101:22-147.75.109.163:38936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:28.466000 audit[10244]: USER_ACCT pid=10244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:28.467330 sshd[10244]: Accepted publickey for core from 147.75.109.163 port 38936 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:26:28.468423 sshd[10244]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:26:28.470929 systemd-logind[1462]: New session 19 of user core. Feb 9 07:26:28.471463 systemd[1]: Started session-19.scope. Feb 9 07:26:28.553991 sshd[10244]: pam_unix(sshd:session): session closed for user core Feb 9 07:26:28.555383 systemd[1]: sshd@37-139.178.90.101:22-147.75.109.163:38936.service: Deactivated successfully. Feb 9 07:26:28.555937 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 07:26:28.556311 systemd-logind[1462]: Session 19 logged out. Waiting for processes to exit. Feb 9 07:26:28.556938 systemd-logind[1462]: Removed session 19. Feb 9 07:26:28.466000 audit[10244]: CRED_ACQ pid=10244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:28.651352 kernel: audit: type=1101 audit(1707463588.466:1835): pid=10244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:28.651393 kernel: audit: type=1103 audit(1707463588.466:1836): pid=10244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:28.651409 kernel: audit: type=1006 audit(1707463588.466:1837): pid=10244 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 9 07:26:28.710057 kernel: audit: type=1300 audit(1707463588.466:1837): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8e06bff0 a2=3 a3=0 items=0 ppid=1 pid=10244 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:28.466000 audit[10244]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8e06bff0 a2=3 a3=0 items=0 ppid=1 pid=10244 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:28.802130 kernel: audit: type=1327 audit(1707463588.466:1837): proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:28.466000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:28.832628 kernel: audit: type=1105 audit(1707463588.472:1838): pid=10244 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:28.472000 audit[10244]: USER_START pid=10244 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:28.927339 kernel: audit: type=1103 audit(1707463588.472:1839): pid=10246 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:28.472000 audit[10246]: CRED_ACQ pid=10246 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:29.016580 kernel: audit: type=1106 audit(1707463588.553:1840): pid=10244 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:28.553000 audit[10244]: USER_END pid=10244 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:29.112134 kernel: audit: type=1104 audit(1707463588.553:1841): pid=10244 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:28.553000 audit[10244]: CRED_DISP pid=10244 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:28.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.101:22-147.75.109.163:38936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:33.564030 systemd[1]: Started sshd@38-139.178.90.101:22-147.75.109.163:38948.service. Feb 9 07:26:33.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.101:22-147.75.109.163:38948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:33.591436 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:26:33.591508 kernel: audit: type=1130 audit(1707463593.562:1843): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.101:22-147.75.109.163:38948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:33.701000 audit[10270]: USER_ACCT pid=10270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:33.703402 sshd[10270]: Accepted publickey for core from 147.75.109.163 port 38948 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:26:33.704826 sshd[10270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:26:33.707367 systemd-logind[1462]: New session 20 of user core. Feb 9 07:26:33.707959 systemd[1]: Started session-20.scope. Feb 9 07:26:33.703000 audit[10270]: CRED_ACQ pid=10270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:33.799631 sshd[10270]: pam_unix(sshd:session): session closed for user core Feb 9 07:26:33.800870 systemd[1]: sshd@38-139.178.90.101:22-147.75.109.163:38948.service: Deactivated successfully. Feb 9 07:26:33.801324 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 07:26:33.801677 systemd-logind[1462]: Session 20 logged out. Waiting for processes to exit. Feb 9 07:26:33.802157 systemd-logind[1462]: Removed session 20. Feb 9 07:26:33.885501 kernel: audit: type=1101 audit(1707463593.701:1844): pid=10270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:33.885560 kernel: audit: type=1103 audit(1707463593.703:1845): pid=10270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:33.885586 kernel: audit: type=1006 audit(1707463593.703:1846): pid=10270 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Feb 9 07:26:33.703000 audit[10270]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5b6af6f0 a2=3 a3=0 items=0 ppid=1 pid=10270 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:34.036324 kernel: audit: type=1300 audit(1707463593.703:1846): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5b6af6f0 a2=3 a3=0 items=0 ppid=1 pid=10270 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:34.036365 kernel: audit: type=1327 audit(1707463593.703:1846): proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:33.703000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:34.066824 kernel: audit: type=1105 audit(1707463593.708:1847): pid=10270 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:33.708000 audit[10270]: USER_START pid=10270 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:34.161353 kernel: audit: type=1103 audit(1707463593.709:1848): pid=10299 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:33.709000 audit[10299]: CRED_ACQ pid=10299 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:33.798000 audit[10270]: USER_END pid=10270 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:34.251576 kernel: audit: type=1106 audit(1707463593.798:1849): pid=10270 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:33.798000 audit[10270]: CRED_DISP pid=10270 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:34.435507 kernel: audit: type=1104 audit(1707463593.798:1850): pid=10270 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:33.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.101:22-147.75.109.163:38948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:38.808942 systemd[1]: Started sshd@39-139.178.90.101:22-147.75.109.163:33640.service. Feb 9 07:26:38.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.101:22-147.75.109.163:33640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:38.836189 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:26:38.836253 kernel: audit: type=1130 audit(1707463598.807:1852): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.101:22-147.75.109.163:33640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:38.948000 audit[10333]: USER_ACCT pid=10333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:38.949840 sshd[10333]: Accepted publickey for core from 147.75.109.163 port 33640 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:26:38.950782 sshd[10333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:26:38.953210 systemd-logind[1462]: New session 21 of user core. Feb 9 07:26:38.953801 systemd[1]: Started session-21.scope. Feb 9 07:26:39.033454 sshd[10333]: pam_unix(sshd:session): session closed for user core Feb 9 07:26:39.034847 systemd[1]: sshd@39-139.178.90.101:22-147.75.109.163:33640.service: Deactivated successfully. Feb 9 07:26:39.035288 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 07:26:39.035614 systemd-logind[1462]: Session 21 logged out. Waiting for processes to exit. Feb 9 07:26:39.036043 systemd-logind[1462]: Removed session 21. Feb 9 07:26:38.949000 audit[10333]: CRED_ACQ pid=10333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:39.131765 kernel: audit: type=1101 audit(1707463598.948:1853): pid=10333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:39.131806 kernel: audit: type=1103 audit(1707463598.949:1854): pid=10333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:39.131823 kernel: audit: type=1006 audit(1707463598.949:1855): pid=10333 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 9 07:26:39.190428 kernel: audit: type=1300 audit(1707463598.949:1855): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecfa452c0 a2=3 a3=0 items=0 ppid=1 pid=10333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:38.949000 audit[10333]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecfa452c0 a2=3 a3=0 items=0 ppid=1 pid=10333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:39.282452 kernel: audit: type=1327 audit(1707463598.949:1855): proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:38.949000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:39.312947 kernel: audit: type=1105 audit(1707463598.954:1856): pid=10333 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:38.954000 audit[10333]: USER_START pid=10333 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:39.407410 kernel: audit: type=1103 audit(1707463598.955:1857): pid=10335 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:38.955000 audit[10335]: CRED_ACQ pid=10335 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:39.032000 audit[10333]: USER_END pid=10333 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:39.592099 kernel: audit: type=1106 audit(1707463599.032:1858): pid=10333 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:39.592129 kernel: audit: type=1104 audit(1707463599.032:1859): pid=10333 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:39.032000 audit[10333]: CRED_DISP pid=10333 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:39.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.101:22-147.75.109.163:33640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:44.045578 systemd[1]: Started sshd@40-139.178.90.101:22-147.75.109.163:33650.service. Feb 9 07:26:44.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.101:22-147.75.109.163:33650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:44.072912 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:26:44.072987 kernel: audit: type=1130 audit(1707463604.044:1861): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.101:22-147.75.109.163:33650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:44.185000 audit[10363]: USER_ACCT pid=10363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:44.186202 sshd[10363]: Accepted publickey for core from 147.75.109.163 port 33650 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:26:44.187308 sshd[10363]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:26:44.189744 systemd-logind[1462]: New session 22 of user core. Feb 9 07:26:44.190287 systemd[1]: Started session-22.scope. Feb 9 07:26:44.269169 sshd[10363]: pam_unix(sshd:session): session closed for user core Feb 9 07:26:44.270591 systemd[1]: sshd@40-139.178.90.101:22-147.75.109.163:33650.service: Deactivated successfully. Feb 9 07:26:44.271040 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 07:26:44.271359 systemd-logind[1462]: Session 22 logged out. Waiting for processes to exit. Feb 9 07:26:44.272002 systemd-logind[1462]: Removed session 22. Feb 9 07:26:44.185000 audit[10363]: CRED_ACQ pid=10363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:44.368127 kernel: audit: type=1101 audit(1707463604.185:1862): pid=10363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:44.368174 kernel: audit: type=1103 audit(1707463604.185:1863): pid=10363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:44.368197 kernel: audit: type=1006 audit(1707463604.185:1864): pid=10363 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 07:26:44.185000 audit[10363]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb0026bf0 a2=3 a3=0 items=0 ppid=1 pid=10363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:44.518799 kernel: audit: type=1300 audit(1707463604.185:1864): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb0026bf0 a2=3 a3=0 items=0 ppid=1 pid=10363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:44.518829 kernel: audit: type=1327 audit(1707463604.185:1864): proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:44.185000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:44.549237 kernel: audit: type=1105 audit(1707463604.190:1865): pid=10363 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:44.190000 audit[10363]: USER_START pid=10363 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:44.643779 kernel: audit: type=1103 audit(1707463604.191:1866): pid=10365 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:44.191000 audit[10365]: CRED_ACQ pid=10365 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:44.733040 kernel: audit: type=1106 audit(1707463604.268:1867): pid=10363 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:44.268000 audit[10363]: USER_END pid=10363 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:44.828573 kernel: audit: type=1104 audit(1707463604.268:1868): pid=10363 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:44.268000 audit[10363]: CRED_DISP pid=10363 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:44.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.101:22-147.75.109.163:33650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:49.279041 systemd[1]: Started sshd@41-139.178.90.101:22-147.75.109.163:56266.service. Feb 9 07:26:49.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.101:22-147.75.109.163:56266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:49.306077 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:26:49.306129 kernel: audit: type=1130 audit(1707463609.277:1870): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.101:22-147.75.109.163:56266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:49.416000 audit[10390]: USER_ACCT pid=10390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:49.418813 sshd[10390]: Accepted publickey for core from 147.75.109.163 port 56266 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:26:49.421799 sshd[10390]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:26:49.429402 systemd-logind[1462]: New session 23 of user core. Feb 9 07:26:49.431720 systemd[1]: Started session-23.scope. Feb 9 07:26:49.420000 audit[10390]: CRED_ACQ pid=10390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:49.515712 sshd[10390]: pam_unix(sshd:session): session closed for user core Feb 9 07:26:49.517153 systemd[1]: sshd@41-139.178.90.101:22-147.75.109.163:56266.service: Deactivated successfully. Feb 9 07:26:49.517602 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 07:26:49.518019 systemd-logind[1462]: Session 23 logged out. Waiting for processes to exit. Feb 9 07:26:49.518427 systemd-logind[1462]: Removed session 23. Feb 9 07:26:49.600618 kernel: audit: type=1101 audit(1707463609.416:1871): pid=10390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:49.600664 kernel: audit: type=1103 audit(1707463609.420:1872): pid=10390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:49.600683 kernel: audit: type=1006 audit(1707463609.420:1873): pid=10390 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 07:26:49.659318 kernel: audit: type=1300 audit(1707463609.420:1873): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf89ec390 a2=3 a3=0 items=0 ppid=1 pid=10390 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:49.420000 audit[10390]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf89ec390 a2=3 a3=0 items=0 ppid=1 pid=10390 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:49.420000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:49.781880 kernel: audit: type=1327 audit(1707463609.420:1873): proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:49.781953 kernel: audit: type=1105 audit(1707463609.437:1874): pid=10390 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:49.437000 audit[10390]: USER_START pid=10390 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:49.439000 audit[10392]: CRED_ACQ pid=10392 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:49.965802 kernel: audit: type=1103 audit(1707463609.439:1875): pid=10392 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:49.965844 kernel: audit: type=1106 audit(1707463609.515:1876): pid=10390 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:49.515000 audit[10390]: USER_END pid=10390 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:50.061374 kernel: audit: type=1104 audit(1707463609.515:1877): pid=10390 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:49.515000 audit[10390]: CRED_DISP pid=10390 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:49.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.101:22-147.75.109.163:56266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:54.525321 systemd[1]: Started sshd@42-139.178.90.101:22-147.75.109.163:60078.service. Feb 9 07:26:54.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.101:22-147.75.109.163:60078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:54.552426 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:26:54.552462 kernel: audit: type=1130 audit(1707463614.524:1879): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.101:22-147.75.109.163:60078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:54.665000 audit[10481]: USER_ACCT pid=10481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:54.666186 sshd[10481]: Accepted publickey for core from 147.75.109.163 port 60078 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:26:54.667243 sshd[10481]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:26:54.669749 systemd-logind[1462]: New session 24 of user core. Feb 9 07:26:54.670197 systemd[1]: Started session-24.scope. Feb 9 07:26:54.749561 sshd[10481]: pam_unix(sshd:session): session closed for user core Feb 9 07:26:54.751033 systemd[1]: sshd@42-139.178.90.101:22-147.75.109.163:60078.service: Deactivated successfully. Feb 9 07:26:54.751483 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 07:26:54.752038 systemd-logind[1462]: Session 24 logged out. Waiting for processes to exit. Feb 9 07:26:54.752980 systemd-logind[1462]: Removed session 24. Feb 9 07:26:54.666000 audit[10481]: CRED_ACQ pid=10481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:54.848092 kernel: audit: type=1101 audit(1707463614.665:1880): pid=10481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:54.848141 kernel: audit: type=1103 audit(1707463614.666:1881): pid=10481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:54.848162 kernel: audit: type=1006 audit(1707463614.666:1882): pid=10481 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 07:26:54.666000 audit[10481]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaef0b1f0 a2=3 a3=0 items=0 ppid=1 pid=10481 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:54.998731 kernel: audit: type=1300 audit(1707463614.666:1882): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaef0b1f0 a2=3 a3=0 items=0 ppid=1 pid=10481 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:26:54.998768 kernel: audit: type=1327 audit(1707463614.666:1882): proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:54.666000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:55.029287 kernel: audit: type=1105 audit(1707463614.672:1883): pid=10481 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:54.672000 audit[10481]: USER_START pid=10481 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:55.123759 kernel: audit: type=1103 audit(1707463614.672:1884): pid=10483 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:54.672000 audit[10483]: CRED_ACQ pid=10483 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:55.212993 kernel: audit: type=1106 audit(1707463614.749:1885): pid=10481 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:54.749000 audit[10481]: USER_END pid=10481 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:55.308512 kernel: audit: type=1104 audit(1707463614.749:1886): pid=10481 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:54.749000 audit[10481]: CRED_DISP pid=10481 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:54.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.101:22-147.75.109.163:60078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:59.759235 systemd[1]: Started sshd@43-139.178.90.101:22-147.75.109.163:60092.service. Feb 9 07:26:59.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.101:22-147.75.109.163:60092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:59.785952 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:26:59.786056 kernel: audit: type=1130 audit(1707463619.758:1888): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.101:22-147.75.109.163:60092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:26:59.898000 audit[10507]: USER_ACCT pid=10507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:59.898680 sshd[10507]: Accepted publickey for core from 147.75.109.163 port 60092 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:26:59.899813 sshd[10507]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:26:59.902171 systemd-logind[1462]: New session 25 of user core. Feb 9 07:26:59.902689 systemd[1]: Started session-25.scope. Feb 9 07:26:59.984030 sshd[10507]: pam_unix(sshd:session): session closed for user core Feb 9 07:26:59.985486 systemd[1]: sshd@43-139.178.90.101:22-147.75.109.163:60092.service: Deactivated successfully. Feb 9 07:26:59.985929 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 07:26:59.986325 systemd-logind[1462]: Session 25 logged out. Waiting for processes to exit. Feb 9 07:26:59.986843 systemd-logind[1462]: Removed session 25. Feb 9 07:26:59.899000 audit[10507]: CRED_ACQ pid=10507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:00.080580 kernel: audit: type=1101 audit(1707463619.898:1889): pid=10507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:00.080628 kernel: audit: type=1103 audit(1707463619.899:1890): pid=10507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:00.080646 kernel: audit: type=1006 audit(1707463619.899:1891): pid=10507 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 07:26:59.899000 audit[10507]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6fea0f50 a2=3 a3=0 items=0 ppid=1 pid=10507 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:00.231323 kernel: audit: type=1300 audit(1707463619.899:1891): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6fea0f50 a2=3 a3=0 items=0 ppid=1 pid=10507 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:00.231356 kernel: audit: type=1327 audit(1707463619.899:1891): proctitle=737368643A20636F7265205B707269765D Feb 9 07:26:59.899000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:00.261822 kernel: audit: type=1105 audit(1707463619.904:1892): pid=10507 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:59.904000 audit[10507]: USER_START pid=10507 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:00.356304 kernel: audit: type=1103 audit(1707463619.904:1893): pid=10509 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:59.904000 audit[10509]: CRED_ACQ pid=10509 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:59.984000 audit[10507]: USER_END pid=10507 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:00.541119 kernel: audit: type=1106 audit(1707463619.984:1894): pid=10507 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:00.541151 kernel: audit: type=1104 audit(1707463619.984:1895): pid=10507 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:59.984000 audit[10507]: CRED_DISP pid=10507 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:26:59.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.101:22-147.75.109.163:60092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:04.993378 systemd[1]: Started sshd@44-139.178.90.101:22-147.75.109.163:44404.service. Feb 9 07:27:04.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.101:22-147.75.109.163:44404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:05.020088 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:27:05.020178 kernel: audit: type=1130 audit(1707463624.992:1897): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.101:22-147.75.109.163:44404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:05.132000 audit[10554]: USER_ACCT pid=10554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:05.132999 sshd[10554]: Accepted publickey for core from 147.75.109.163 port 44404 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:27:05.133778 sshd[10554]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:27:05.135940 systemd-logind[1462]: New session 26 of user core. Feb 9 07:27:05.136561 systemd[1]: Started session-26.scope. Feb 9 07:27:05.216276 sshd[10554]: pam_unix(sshd:session): session closed for user core Feb 9 07:27:05.217565 systemd[1]: sshd@44-139.178.90.101:22-147.75.109.163:44404.service: Deactivated successfully. Feb 9 07:27:05.218016 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 07:27:05.218360 systemd-logind[1462]: Session 26 logged out. Waiting for processes to exit. Feb 9 07:27:05.218803 systemd-logind[1462]: Removed session 26. Feb 9 07:27:05.133000 audit[10554]: CRED_ACQ pid=10554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:05.315098 kernel: audit: type=1101 audit(1707463625.132:1898): pid=10554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:05.315142 kernel: audit: type=1103 audit(1707463625.133:1899): pid=10554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:05.315162 kernel: audit: type=1006 audit(1707463625.133:1900): pid=10554 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 07:27:05.133000 audit[10554]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbd8e9950 a2=3 a3=0 items=0 ppid=1 pid=10554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:05.465810 kernel: audit: type=1300 audit(1707463625.133:1900): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbd8e9950 a2=3 a3=0 items=0 ppid=1 pid=10554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:05.465841 kernel: audit: type=1327 audit(1707463625.133:1900): proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:05.133000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:05.496303 kernel: audit: type=1105 audit(1707463625.138:1901): pid=10554 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:05.138000 audit[10554]: USER_START pid=10554 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:05.139000 audit[10556]: CRED_ACQ pid=10556 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:05.591567 kernel: audit: type=1103 audit(1707463625.139:1902): pid=10556 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:05.216000 audit[10554]: USER_END pid=10554 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:05.775569 kernel: audit: type=1106 audit(1707463625.216:1903): pid=10554 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:05.775601 kernel: audit: type=1104 audit(1707463625.216:1904): pid=10554 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:05.216000 audit[10554]: CRED_DISP pid=10554 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:05.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.101:22-147.75.109.163:44404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:10.226076 systemd[1]: Started sshd@45-139.178.90.101:22-147.75.109.163:44406.service. Feb 9 07:27:10.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.101:22-147.75.109.163:44406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:10.252824 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:27:10.252927 kernel: audit: type=1130 audit(1707463630.225:1906): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.101:22-147.75.109.163:44406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:10.365000 audit[10581]: USER_ACCT pid=10581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:10.366056 sshd[10581]: Accepted publickey for core from 147.75.109.163 port 44406 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:27:10.367314 sshd[10581]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:27:10.369883 systemd-logind[1462]: New session 27 of user core. Feb 9 07:27:10.370453 systemd[1]: Started session-27.scope. Feb 9 07:27:10.450179 sshd[10581]: pam_unix(sshd:session): session closed for user core Feb 9 07:27:10.451577 systemd[1]: sshd@45-139.178.90.101:22-147.75.109.163:44406.service: Deactivated successfully. Feb 9 07:27:10.452038 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 07:27:10.452354 systemd-logind[1462]: Session 27 logged out. Waiting for processes to exit. Feb 9 07:27:10.452993 systemd-logind[1462]: Removed session 27. Feb 9 07:27:10.366000 audit[10581]: CRED_ACQ pid=10581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:10.547943 kernel: audit: type=1101 audit(1707463630.365:1907): pid=10581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:10.547980 kernel: audit: type=1103 audit(1707463630.366:1908): pid=10581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:10.548005 kernel: audit: type=1006 audit(1707463630.366:1909): pid=10581 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 07:27:10.606682 kernel: audit: type=1300 audit(1707463630.366:1909): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc1ccf7a0 a2=3 a3=0 items=0 ppid=1 pid=10581 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:10.366000 audit[10581]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc1ccf7a0 a2=3 a3=0 items=0 ppid=1 pid=10581 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:10.698672 kernel: audit: type=1327 audit(1707463630.366:1909): proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:10.366000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:10.729151 kernel: audit: type=1105 audit(1707463630.372:1910): pid=10581 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:10.372000 audit[10581]: USER_START pid=10581 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:10.823635 kernel: audit: type=1103 audit(1707463630.372:1911): pid=10583 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:10.372000 audit[10583]: CRED_ACQ pid=10583 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:10.912908 kernel: audit: type=1106 audit(1707463630.450:1912): pid=10581 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:10.450000 audit[10581]: USER_END pid=10581 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:10.450000 audit[10581]: CRED_DISP pid=10581 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:11.097840 kernel: audit: type=1104 audit(1707463630.450:1913): pid=10581 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:10.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.101:22-147.75.109.163:44406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:15.462705 systemd[1]: Started sshd@46-139.178.90.101:22-147.75.109.163:51646.service. Feb 9 07:27:15.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.101:22-147.75.109.163:51646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:15.490213 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:27:15.490267 kernel: audit: type=1130 audit(1707463635.462:1915): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.101:22-147.75.109.163:51646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:15.601000 audit[10614]: USER_ACCT pid=10614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:15.602645 sshd[10614]: Accepted publickey for core from 147.75.109.163 port 51646 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:27:15.603823 sshd[10614]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:27:15.606221 systemd-logind[1462]: New session 28 of user core. Feb 9 07:27:15.606885 systemd[1]: Started session-28.scope. Feb 9 07:27:15.603000 audit[10614]: CRED_ACQ pid=10614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:15.784731 kernel: audit: type=1101 audit(1707463635.601:1916): pid=10614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:15.784769 kernel: audit: type=1103 audit(1707463635.603:1917): pid=10614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:15.784786 kernel: audit: type=1006 audit(1707463635.603:1918): pid=10614 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 07:27:15.821040 sshd[10614]: pam_unix(sshd:session): session closed for user core Feb 9 07:27:15.822812 systemd[1]: sshd@46-139.178.90.101:22-147.75.109.163:51646.service: Deactivated successfully. Feb 9 07:27:15.823624 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 07:27:15.824233 systemd-logind[1462]: Session 28 logged out. Waiting for processes to exit. Feb 9 07:27:15.824905 systemd-logind[1462]: Removed session 28. Feb 9 07:27:15.603000 audit[10614]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5c455fb0 a2=3 a3=0 items=0 ppid=1 pid=10614 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:15.935573 kernel: audit: type=1300 audit(1707463635.603:1918): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5c455fb0 a2=3 a3=0 items=0 ppid=1 pid=10614 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:15.935614 kernel: audit: type=1327 audit(1707463635.603:1918): proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:15.603000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:15.608000 audit[10614]: USER_START pid=10614 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:16.060579 kernel: audit: type=1105 audit(1707463635.608:1919): pid=10614 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:16.060614 kernel: audit: type=1103 audit(1707463635.609:1920): pid=10616 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:15.609000 audit[10616]: CRED_ACQ pid=10616 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:15.821000 audit[10614]: USER_END pid=10614 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:16.245519 kernel: audit: type=1106 audit(1707463635.821:1921): pid=10614 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:16.245554 kernel: audit: type=1104 audit(1707463635.821:1922): pid=10614 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:15.821000 audit[10614]: CRED_DISP pid=10614 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:15.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.101:22-147.75.109.163:51646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:15.883000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:27:15.883000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001ae4b80 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:27:15.883000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:27:16.073000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:27:16.073000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001c25500 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:27:16.073000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:27:19.893000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:27:19.893000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019aed80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:27:19.893000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:27:19.893000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:27:19.893000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017a0b00 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:27:19.893000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:27:19.944000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:27:19.944000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c014b681e0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:27:19.944000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:27:19.944000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:27:19.944000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c014a10f80 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:27:19.944000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:27:19.945000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:27:19.945000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c014b68240 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:27:19.945000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:27:19.945000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:27:19.945000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c014b1ace0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:27:19.945000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:27:19.945000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:27:19.945000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c014830f60 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:27:19.945000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:27:19.983000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:27:19.983000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0103d6f30 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:27:19.983000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:27:20.831109 systemd[1]: Started sshd@47-139.178.90.101:22-147.75.109.163:51652.service. Feb 9 07:27:20.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.101:22-147.75.109.163:51652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:20.858392 kernel: kauditd_printk_skb: 31 callbacks suppressed Feb 9 07:27:20.858445 kernel: audit: type=1130 audit(1707463640.830:1934): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.101:22-147.75.109.163:51652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:20.971000 audit[10666]: USER_ACCT pid=10666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:20.972806 sshd[10666]: Accepted publickey for core from 147.75.109.163 port 51652 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:27:20.975657 sshd[10666]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:27:20.980719 systemd-logind[1462]: New session 29 of user core. Feb 9 07:27:20.981273 systemd[1]: Started session-29.scope. Feb 9 07:27:21.061092 sshd[10666]: pam_unix(sshd:session): session closed for user core Feb 9 07:27:21.062592 systemd[1]: sshd@47-139.178.90.101:22-147.75.109.163:51652.service: Deactivated successfully. Feb 9 07:27:21.063039 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 07:27:21.063356 systemd-logind[1462]: Session 29 logged out. Waiting for processes to exit. Feb 9 07:27:20.974000 audit[10666]: CRED_ACQ pid=10666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:21.064022 systemd-logind[1462]: Removed session 29. Feb 9 07:27:21.154521 kernel: audit: type=1101 audit(1707463640.971:1935): pid=10666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:21.154566 kernel: audit: type=1103 audit(1707463640.974:1936): pid=10666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:21.154583 kernel: audit: type=1006 audit(1707463640.974:1937): pid=10666 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 9 07:27:20.974000 audit[10666]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbc246620 a2=3 a3=0 items=0 ppid=1 pid=10666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:21.305233 kernel: audit: type=1300 audit(1707463640.974:1937): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbc246620 a2=3 a3=0 items=0 ppid=1 pid=10666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:21.305265 kernel: audit: type=1327 audit(1707463640.974:1937): proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:20.974000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:21.335747 kernel: audit: type=1105 audit(1707463640.983:1938): pid=10666 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:20.983000 audit[10666]: USER_START pid=10666 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:21.430261 kernel: audit: type=1103 audit(1707463640.983:1939): pid=10668 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:20.983000 audit[10668]: CRED_ACQ pid=10668 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:21.061000 audit[10666]: USER_END pid=10666 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:21.061000 audit[10666]: CRED_DISP pid=10666 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:21.704498 kernel: audit: type=1106 audit(1707463641.061:1940): pid=10666 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:21.704543 kernel: audit: type=1104 audit(1707463641.061:1941): pid=10666 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:21.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.101:22-147.75.109.163:51652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:24.036000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:27:24.036000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc07a0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:27:24.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:27:24.036000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:27:24.036000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001cb33c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:27:24.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:27:24.036000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:27:24.036000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001cb33e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:27:24.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:27:24.036000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:27:24.036000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c001c276a0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:27:24.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:27:26.071379 systemd[1]: Started sshd@48-139.178.90.101:22-147.75.109.163:45548.service. Feb 9 07:27:26.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.101:22-147.75.109.163:45548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:26.098437 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 07:27:26.098474 kernel: audit: type=1130 audit(1707463646.070:1947): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.101:22-147.75.109.163:45548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:26.211000 audit[10731]: USER_ACCT pid=10731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:26.212363 sshd[10731]: Accepted publickey for core from 147.75.109.163 port 45548 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:27:26.213832 sshd[10731]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:27:26.216179 systemd-logind[1462]: New session 30 of user core. Feb 9 07:27:26.216874 systemd[1]: Started session-30.scope. Feb 9 07:27:26.295613 sshd[10731]: pam_unix(sshd:session): session closed for user core Feb 9 07:27:26.297003 systemd[1]: sshd@48-139.178.90.101:22-147.75.109.163:45548.service: Deactivated successfully. Feb 9 07:27:26.297452 systemd[1]: session-30.scope: Deactivated successfully. Feb 9 07:27:26.297860 systemd-logind[1462]: Session 30 logged out. Waiting for processes to exit. Feb 9 07:27:26.298360 systemd-logind[1462]: Removed session 30. Feb 9 07:27:26.213000 audit[10731]: CRED_ACQ pid=10731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:26.395198 kernel: audit: type=1101 audit(1707463646.211:1948): pid=10731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:26.395234 kernel: audit: type=1103 audit(1707463646.213:1949): pid=10731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:26.395259 kernel: audit: type=1006 audit(1707463646.213:1950): pid=10731 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Feb 9 07:27:26.453896 kernel: audit: type=1300 audit(1707463646.213:1950): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff50eb1750 a2=3 a3=0 items=0 ppid=1 pid=10731 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:26.213000 audit[10731]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff50eb1750 a2=3 a3=0 items=0 ppid=1 pid=10731 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:26.545920 kernel: audit: type=1327 audit(1707463646.213:1950): proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:26.213000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:26.576389 kernel: audit: type=1105 audit(1707463646.218:1951): pid=10731 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:26.218000 audit[10731]: USER_START pid=10731 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:26.219000 audit[10733]: CRED_ACQ pid=10733 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:26.760101 kernel: audit: type=1103 audit(1707463646.219:1952): pid=10733 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:26.760138 kernel: audit: type=1106 audit(1707463646.295:1953): pid=10731 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:26.295000 audit[10731]: USER_END pid=10731 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:26.295000 audit[10731]: CRED_DISP pid=10731 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:26.944917 kernel: audit: type=1104 audit(1707463646.295:1954): pid=10731 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:26.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.101:22-147.75.109.163:45548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:31.305860 systemd[1]: Started sshd@49-139.178.90.101:22-147.75.109.163:45554.service. Feb 9 07:27:31.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.101:22-147.75.109.163:45554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:31.332770 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:27:31.332826 kernel: audit: type=1130 audit(1707463651.305:1956): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.101:22-147.75.109.163:45554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:31.444000 audit[10757]: USER_ACCT pid=10757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:31.445502 sshd[10757]: Accepted publickey for core from 147.75.109.163 port 45554 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:27:31.446795 sshd[10757]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:27:31.449195 systemd-logind[1462]: New session 31 of user core. Feb 9 07:27:31.449696 systemd[1]: Started session-31.scope. Feb 9 07:27:31.446000 audit[10757]: CRED_ACQ pid=10757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:31.627417 kernel: audit: type=1101 audit(1707463651.444:1957): pid=10757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:31.627474 kernel: audit: type=1103 audit(1707463651.446:1958): pid=10757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:31.627495 kernel: audit: type=1006 audit(1707463651.446:1959): pid=10757 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Feb 9 07:27:31.686084 kernel: audit: type=1300 audit(1707463651.446:1959): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9efb4cb0 a2=3 a3=0 items=0 ppid=1 pid=10757 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:31.446000 audit[10757]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9efb4cb0 a2=3 a3=0 items=0 ppid=1 pid=10757 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:31.446000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:31.778376 sshd[10757]: pam_unix(sshd:session): session closed for user core Feb 9 07:27:31.779737 systemd[1]: sshd@49-139.178.90.101:22-147.75.109.163:45554.service: Deactivated successfully. Feb 9 07:27:31.780172 systemd[1]: session-31.scope: Deactivated successfully. Feb 9 07:27:31.780465 systemd-logind[1462]: Session 31 logged out. Waiting for processes to exit. Feb 9 07:27:31.781095 systemd-logind[1462]: Removed session 31. Feb 9 07:27:31.808584 kernel: audit: type=1327 audit(1707463651.446:1959): proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:31.808618 kernel: audit: type=1105 audit(1707463651.451:1960): pid=10757 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:31.451000 audit[10757]: USER_START pid=10757 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:31.903202 kernel: audit: type=1103 audit(1707463651.452:1961): pid=10759 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:31.452000 audit[10759]: CRED_ACQ pid=10759 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:31.992422 kernel: audit: type=1106 audit(1707463651.778:1962): pid=10757 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:31.778000 audit[10757]: USER_END pid=10757 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:32.087950 kernel: audit: type=1104 audit(1707463651.778:1963): pid=10757 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:31.778000 audit[10757]: CRED_DISP pid=10757 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:31.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.101:22-147.75.109.163:45554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:36.731119 systemd[1]: Started sshd@50-139.178.90.101:22-147.75.109.163:33070.service. Feb 9 07:27:36.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.101:22-147.75.109.163:33070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:36.758089 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:27:36.758164 kernel: audit: type=1130 audit(1707463656.730:1965): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.101:22-147.75.109.163:33070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:36.870000 audit[10823]: USER_ACCT pid=10823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:36.871455 sshd[10823]: Accepted publickey for core from 147.75.109.163 port 33070 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:27:36.872822 sshd[10823]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:27:36.874957 systemd-logind[1462]: New session 32 of user core. Feb 9 07:27:36.875466 systemd[1]: Started session-32.scope. Feb 9 07:27:36.955549 sshd[10823]: pam_unix(sshd:session): session closed for user core Feb 9 07:27:36.956820 systemd[1]: sshd@50-139.178.90.101:22-147.75.109.163:33070.service: Deactivated successfully. Feb 9 07:27:36.957264 systemd[1]: session-32.scope: Deactivated successfully. Feb 9 07:27:36.957530 systemd-logind[1462]: Session 32 logged out. Waiting for processes to exit. Feb 9 07:27:36.957986 systemd-logind[1462]: Removed session 32. Feb 9 07:27:36.872000 audit[10823]: CRED_ACQ pid=10823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:37.053511 kernel: audit: type=1101 audit(1707463656.870:1966): pid=10823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:37.053547 kernel: audit: type=1103 audit(1707463656.872:1967): pid=10823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:37.053566 kernel: audit: type=1006 audit(1707463656.872:1968): pid=10823 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Feb 9 07:27:37.112244 kernel: audit: type=1300 audit(1707463656.872:1968): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0bb2e100 a2=3 a3=0 items=0 ppid=1 pid=10823 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:36.872000 audit[10823]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0bb2e100 a2=3 a3=0 items=0 ppid=1 pid=10823 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:37.204279 kernel: audit: type=1327 audit(1707463656.872:1968): proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:36.872000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:37.234747 kernel: audit: type=1105 audit(1707463656.877:1969): pid=10823 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:36.877000 audit[10823]: USER_START pid=10823 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:37.329218 kernel: audit: type=1103 audit(1707463656.877:1970): pid=10825 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:36.877000 audit[10825]: CRED_ACQ pid=10825 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:37.418480 kernel: audit: type=1106 audit(1707463656.955:1971): pid=10823 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:36.955000 audit[10823]: USER_END pid=10823 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:37.514006 kernel: audit: type=1104 audit(1707463656.955:1972): pid=10823 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:36.955000 audit[10823]: CRED_DISP pid=10823 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:36.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.101:22-147.75.109.163:33070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:41.965243 systemd[1]: Started sshd@51-139.178.90.101:22-147.75.109.163:33086.service. Feb 9 07:27:41.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.101:22-147.75.109.163:33086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:41.992121 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:27:41.992189 kernel: audit: type=1130 audit(1707463661.964:1974): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.101:22-147.75.109.163:33086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:42.105000 audit[10850]: USER_ACCT pid=10850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:42.106087 sshd[10850]: Accepted publickey for core from 147.75.109.163 port 33086 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:27:42.106807 sshd[10850]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:27:42.109386 systemd-logind[1462]: New session 33 of user core. Feb 9 07:27:42.109876 systemd[1]: Started session-33.scope. Feb 9 07:27:42.189791 sshd[10850]: pam_unix(sshd:session): session closed for user core Feb 9 07:27:42.191530 systemd[1]: sshd@51-139.178.90.101:22-147.75.109.163:33086.service: Deactivated successfully. Feb 9 07:27:42.191975 systemd[1]: session-33.scope: Deactivated successfully. Feb 9 07:27:42.192441 systemd-logind[1462]: Session 33 logged out. Waiting for processes to exit. Feb 9 07:27:42.193042 systemd-logind[1462]: Removed session 33. Feb 9 07:27:42.106000 audit[10850]: CRED_ACQ pid=10850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:42.288723 kernel: audit: type=1101 audit(1707463662.105:1975): pid=10850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:42.288783 kernel: audit: type=1103 audit(1707463662.106:1976): pid=10850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:42.288800 kernel: audit: type=1006 audit(1707463662.106:1977): pid=10850 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 Feb 9 07:27:42.347373 kernel: audit: type=1300 audit(1707463662.106:1977): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbd157c90 a2=3 a3=0 items=0 ppid=1 pid=10850 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:42.106000 audit[10850]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbd157c90 a2=3 a3=0 items=0 ppid=1 pid=10850 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:42.439370 kernel: audit: type=1327 audit(1707463662.106:1977): proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:42.106000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:42.469820 kernel: audit: type=1105 audit(1707463662.112:1978): pid=10850 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:42.112000 audit[10850]: USER_START pid=10850 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:42.113000 audit[10852]: CRED_ACQ pid=10852 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:42.653574 kernel: audit: type=1103 audit(1707463662.113:1979): pid=10852 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:42.653613 kernel: audit: type=1106 audit(1707463662.190:1980): pid=10850 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:42.190000 audit[10850]: USER_END pid=10850 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:42.749063 kernel: audit: type=1104 audit(1707463662.190:1981): pid=10850 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:42.190000 audit[10850]: CRED_DISP pid=10850 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:42.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.101:22-147.75.109.163:33086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:47.201856 systemd[1]: Started sshd@52-139.178.90.101:22-147.75.109.163:45218.service. Feb 9 07:27:47.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.101:22-147.75.109.163:45218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:47.229692 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:27:47.229775 kernel: audit: type=1130 audit(1707463667.201:1983): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.101:22-147.75.109.163:45218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:47.342000 audit[10894]: USER_ACCT pid=10894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:47.342971 sshd[10894]: Accepted publickey for core from 147.75.109.163 port 45218 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:27:47.343790 sshd[10894]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:27:47.346212 systemd-logind[1462]: New session 34 of user core. Feb 9 07:27:47.346733 systemd[1]: Started session-34.scope. Feb 9 07:27:47.427149 sshd[10894]: pam_unix(sshd:session): session closed for user core Feb 9 07:27:47.428596 systemd[1]: sshd@52-139.178.90.101:22-147.75.109.163:45218.service: Deactivated successfully. Feb 9 07:27:47.429034 systemd[1]: session-34.scope: Deactivated successfully. Feb 9 07:27:47.429359 systemd-logind[1462]: Session 34 logged out. Waiting for processes to exit. Feb 9 07:27:47.429998 systemd-logind[1462]: Removed session 34. Feb 9 07:27:47.343000 audit[10894]: CRED_ACQ pid=10894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:47.524862 kernel: audit: type=1101 audit(1707463667.342:1984): pid=10894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:47.524902 kernel: audit: type=1103 audit(1707463667.343:1985): pid=10894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:47.524921 kernel: audit: type=1006 audit(1707463667.343:1986): pid=10894 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=34 res=1 Feb 9 07:27:47.583473 kernel: audit: type=1300 audit(1707463667.343:1986): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6372a3e0 a2=3 a3=0 items=0 ppid=1 pid=10894 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:47.343000 audit[10894]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6372a3e0 a2=3 a3=0 items=0 ppid=1 pid=10894 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:47.343000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:47.705962 kernel: audit: type=1327 audit(1707463667.343:1986): proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:47.705995 kernel: audit: type=1105 audit(1707463667.348:1987): pid=10894 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:47.348000 audit[10894]: USER_START pid=10894 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:47.800442 kernel: audit: type=1103 audit(1707463667.349:1988): pid=10896 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:47.349000 audit[10896]: CRED_ACQ pid=10896 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:47.889667 kernel: audit: type=1106 audit(1707463667.427:1989): pid=10894 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:47.427000 audit[10894]: USER_END pid=10894 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:47.985212 kernel: audit: type=1104 audit(1707463667.427:1990): pid=10894 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:47.427000 audit[10894]: CRED_DISP pid=10894 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:47.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.101:22-147.75.109.163:45218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:52.437393 systemd[1]: Started sshd@53-139.178.90.101:22-147.75.109.163:45234.service. Feb 9 07:27:52.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.101:22-147.75.109.163:45234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:52.464286 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:27:52.464352 kernel: audit: type=1130 audit(1707463672.436:1992): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.101:22-147.75.109.163:45234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:52.577000 audit[10947]: USER_ACCT pid=10947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:52.577686 sshd[10947]: Accepted publickey for core from 147.75.109.163 port 45234 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:27:52.579775 sshd[10947]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:27:52.582198 systemd-logind[1462]: New session 35 of user core. Feb 9 07:27:52.582686 systemd[1]: Started session-35.scope. Feb 9 07:27:52.661719 sshd[10947]: pam_unix(sshd:session): session closed for user core Feb 9 07:27:52.663162 systemd[1]: sshd@53-139.178.90.101:22-147.75.109.163:45234.service: Deactivated successfully. Feb 9 07:27:52.663617 systemd[1]: session-35.scope: Deactivated successfully. Feb 9 07:27:52.664000 systemd-logind[1462]: Session 35 logged out. Waiting for processes to exit. Feb 9 07:27:52.664390 systemd-logind[1462]: Removed session 35. Feb 9 07:27:52.579000 audit[10947]: CRED_ACQ pid=10947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:52.759724 kernel: audit: type=1101 audit(1707463672.577:1993): pid=10947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:52.759926 kernel: audit: type=1103 audit(1707463672.579:1994): pid=10947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:52.759945 kernel: audit: type=1006 audit(1707463672.579:1995): pid=10947 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=35 res=1 Feb 9 07:27:52.818428 kernel: audit: type=1300 audit(1707463672.579:1995): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddfb22de0 a2=3 a3=0 items=0 ppid=1 pid=10947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:52.579000 audit[10947]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddfb22de0 a2=3 a3=0 items=0 ppid=1 pid=10947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:52.910484 kernel: audit: type=1327 audit(1707463672.579:1995): proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:52.579000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:52.940966 kernel: audit: type=1105 audit(1707463672.584:1996): pid=10947 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:52.584000 audit[10947]: USER_START pid=10947 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:53.035521 kernel: audit: type=1103 audit(1707463672.584:1997): pid=10949 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:52.584000 audit[10949]: CRED_ACQ pid=10949 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:53.124870 kernel: audit: type=1106 audit(1707463672.661:1998): pid=10947 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:52.661000 audit[10947]: USER_END pid=10947 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:52.661000 audit[10947]: CRED_DISP pid=10947 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:53.309777 kernel: audit: type=1104 audit(1707463672.661:1999): pid=10947 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:52.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.101:22-147.75.109.163:45234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:57.673883 systemd[1]: Started sshd@54-139.178.90.101:22-147.75.109.163:50976.service. Feb 9 07:27:57.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.101:22-147.75.109.163:50976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:57.701507 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:27:57.701603 kernel: audit: type=1130 audit(1707463677.673:2001): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.101:22-147.75.109.163:50976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:57.813000 audit[11012]: USER_ACCT pid=11012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:57.814206 sshd[11012]: Accepted publickey for core from 147.75.109.163 port 50976 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:27:57.815671 sshd[11012]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:27:57.818189 systemd-logind[1462]: New session 36 of user core. Feb 9 07:27:57.818668 systemd[1]: Started session-36.scope. Feb 9 07:27:57.814000 audit[11012]: CRED_ACQ pid=11012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:57.907942 sshd[11012]: pam_unix(sshd:session): session closed for user core Feb 9 07:27:57.909385 systemd[1]: sshd@54-139.178.90.101:22-147.75.109.163:50976.service: Deactivated successfully. Feb 9 07:27:57.909827 systemd[1]: session-36.scope: Deactivated successfully. Feb 9 07:27:57.910250 systemd-logind[1462]: Session 36 logged out. Waiting for processes to exit. Feb 9 07:27:57.910860 systemd-logind[1462]: Removed session 36. Feb 9 07:27:57.996275 kernel: audit: type=1101 audit(1707463677.813:2002): pid=11012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:57.996343 kernel: audit: type=1103 audit(1707463677.814:2003): pid=11012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:57.996366 kernel: audit: type=1006 audit(1707463677.815:2004): pid=11012 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=36 res=1 Feb 9 07:27:57.815000 audit[11012]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc41ae9e20 a2=3 a3=0 items=0 ppid=1 pid=11012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:58.147070 kernel: audit: type=1300 audit(1707463677.815:2004): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc41ae9e20 a2=3 a3=0 items=0 ppid=1 pid=11012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:27:58.147103 kernel: audit: type=1327 audit(1707463677.815:2004): proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:57.815000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:27:58.177576 kernel: audit: type=1105 audit(1707463677.820:2005): pid=11012 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:57.820000 audit[11012]: USER_START pid=11012 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:57.820000 audit[11014]: CRED_ACQ pid=11014 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:58.361564 kernel: audit: type=1103 audit(1707463677.820:2006): pid=11014 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:58.361602 kernel: audit: type=1106 audit(1707463677.908:2007): pid=11012 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:57.908000 audit[11012]: USER_END pid=11012 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:57.908000 audit[11012]: CRED_DISP pid=11012 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:58.546576 kernel: audit: type=1104 audit(1707463677.908:2008): pid=11012 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:27:57.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.101:22-147.75.109.163:50976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:02.919147 systemd[1]: Started sshd@55-139.178.90.101:22-147.75.109.163:50982.service. Feb 9 07:28:02.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.101:22-147.75.109.163:50982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:02.946808 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:28:02.946862 kernel: audit: type=1130 audit(1707463682.919:2010): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.101:22-147.75.109.163:50982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:03.059000 audit[11037]: USER_ACCT pid=11037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:03.060041 sshd[11037]: Accepted publickey for core from 147.75.109.163 port 50982 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:28:03.061779 sshd[11037]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:28:03.064182 systemd-logind[1462]: New session 37 of user core. Feb 9 07:28:03.064639 systemd[1]: Started session-37.scope. Feb 9 07:28:03.144777 sshd[11037]: pam_unix(sshd:session): session closed for user core Feb 9 07:28:03.146056 systemd[1]: sshd@55-139.178.90.101:22-147.75.109.163:50982.service: Deactivated successfully. Feb 9 07:28:03.146506 systemd[1]: session-37.scope: Deactivated successfully. Feb 9 07:28:03.146861 systemd-logind[1462]: Session 37 logged out. Waiting for processes to exit. Feb 9 07:28:03.147284 systemd-logind[1462]: Removed session 37. Feb 9 07:28:03.151524 kernel: audit: type=1101 audit(1707463683.059:2011): pid=11037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:03.151552 kernel: audit: type=1103 audit(1707463683.061:2012): pid=11037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:03.061000 audit[11037]: CRED_ACQ pid=11037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:03.300971 kernel: audit: type=1006 audit(1707463683.061:2013): pid=11037 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=37 res=1 Feb 9 07:28:03.301007 kernel: audit: type=1300 audit(1707463683.061:2013): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe75c626a0 a2=3 a3=0 items=0 ppid=1 pid=11037 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:03.061000 audit[11037]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe75c626a0 a2=3 a3=0 items=0 ppid=1 pid=11037 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:03.061000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:03.423680 kernel: audit: type=1327 audit(1707463683.061:2013): proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:03.423712 kernel: audit: type=1105 audit(1707463683.065:2014): pid=11037 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:03.065000 audit[11037]: USER_START pid=11037 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:03.518237 kernel: audit: type=1103 audit(1707463683.066:2015): pid=11039 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:03.066000 audit[11039]: CRED_ACQ pid=11039 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:03.607573 kernel: audit: type=1106 audit(1707463683.144:2016): pid=11037 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:03.144000 audit[11037]: USER_END pid=11037 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:03.703189 kernel: audit: type=1104 audit(1707463683.144:2017): pid=11037 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:03.144000 audit[11037]: CRED_DISP pid=11037 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:03.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.101:22-147.75.109.163:50982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:08.154917 systemd[1]: Started sshd@56-139.178.90.101:22-147.75.109.163:51942.service. Feb 9 07:28:08.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.101:22-147.75.109.163:51942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:08.181809 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:28:08.181918 kernel: audit: type=1130 audit(1707463688.154:2019): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.101:22-147.75.109.163:51942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:08.293000 audit[11081]: USER_ACCT pid=11081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:08.294146 sshd[11081]: Accepted publickey for core from 147.75.109.163 port 51942 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:28:08.295811 sshd[11081]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:28:08.298230 systemd-logind[1462]: New session 38 of user core. Feb 9 07:28:08.298733 systemd[1]: Started session-38.scope. Feb 9 07:28:08.295000 audit[11081]: CRED_ACQ pid=11081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:08.476186 kernel: audit: type=1101 audit(1707463688.293:2020): pid=11081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:08.476226 kernel: audit: type=1103 audit(1707463688.295:2021): pid=11081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:08.476243 kernel: audit: type=1006 audit(1707463688.295:2022): pid=11081 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=38 res=1 Feb 9 07:28:08.511729 sshd[11081]: pam_unix(sshd:session): session closed for user core Feb 9 07:28:08.513135 systemd[1]: sshd@56-139.178.90.101:22-147.75.109.163:51942.service: Deactivated successfully. Feb 9 07:28:08.513586 systemd[1]: session-38.scope: Deactivated successfully. Feb 9 07:28:08.513900 systemd-logind[1462]: Session 38 logged out. Waiting for processes to exit. Feb 9 07:28:08.514324 systemd-logind[1462]: Removed session 38. Feb 9 07:28:08.295000 audit[11081]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb8d5a080 a2=3 a3=0 items=0 ppid=1 pid=11081 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:08.627017 kernel: audit: type=1300 audit(1707463688.295:2022): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb8d5a080 a2=3 a3=0 items=0 ppid=1 pid=11081 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:08.627059 kernel: audit: type=1327 audit(1707463688.295:2022): proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:08.295000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:08.657575 kernel: audit: type=1105 audit(1707463688.300:2023): pid=11081 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:08.300000 audit[11081]: USER_START pid=11081 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:08.752163 kernel: audit: type=1103 audit(1707463688.300:2024): pid=11083 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:08.300000 audit[11083]: CRED_ACQ pid=11083 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:08.841495 kernel: audit: type=1106 audit(1707463688.511:2025): pid=11081 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:08.511000 audit[11081]: USER_END pid=11081 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:08.937132 kernel: audit: type=1104 audit(1707463688.511:2026): pid=11081 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:08.511000 audit[11081]: CRED_DISP pid=11081 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:08.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.101:22-147.75.109.163:51942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:13.522989 systemd[1]: Started sshd@57-139.178.90.101:22-147.75.109.163:51958.service. Feb 9 07:28:13.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.101:22-147.75.109.163:51958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:13.560764 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:28:13.560857 kernel: audit: type=1130 audit(1707463693.521:2028): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.101:22-147.75.109.163:51958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:13.586267 sshd[11110]: Accepted publickey for core from 147.75.109.163 port 51958 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:28:13.587394 sshd[11110]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:28:13.589881 systemd-logind[1462]: New session 39 of user core. Feb 9 07:28:13.590353 systemd[1]: Started session-39.scope. Feb 9 07:28:13.584000 audit[11110]: USER_ACCT pid=11110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:13.670802 sshd[11110]: pam_unix(sshd:session): session closed for user core Feb 9 07:28:13.672207 systemd[1]: sshd@57-139.178.90.101:22-147.75.109.163:51958.service: Deactivated successfully. Feb 9 07:28:13.672660 systemd[1]: session-39.scope: Deactivated successfully. Feb 9 07:28:13.673021 systemd-logind[1462]: Session 39 logged out. Waiting for processes to exit. Feb 9 07:28:13.673420 systemd-logind[1462]: Removed session 39. Feb 9 07:28:13.740230 kernel: audit: type=1101 audit(1707463693.584:2029): pid=11110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:13.740278 kernel: audit: type=1103 audit(1707463693.585:2030): pid=11110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:13.585000 audit[11110]: CRED_ACQ pid=11110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:13.889728 kernel: audit: type=1006 audit(1707463693.585:2031): pid=11110 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=39 res=1 Feb 9 07:28:13.889767 kernel: audit: type=1300 audit(1707463693.585:2031): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc90261ab0 a2=3 a3=0 items=0 ppid=1 pid=11110 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:13.585000 audit[11110]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc90261ab0 a2=3 a3=0 items=0 ppid=1 pid=11110 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:13.585000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:14.012356 kernel: audit: type=1327 audit(1707463693.585:2031): proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:14.012386 kernel: audit: type=1105 audit(1707463693.591:2032): pid=11110 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:13.591000 audit[11110]: USER_START pid=11110 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:13.592000 audit[11112]: CRED_ACQ pid=11112 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:14.196285 kernel: audit: type=1103 audit(1707463693.592:2033): pid=11112 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:14.196317 kernel: audit: type=1106 audit(1707463693.669:2034): pid=11110 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:13.669000 audit[11110]: USER_END pid=11110 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:14.291956 kernel: audit: type=1104 audit(1707463693.670:2035): pid=11110 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:13.670000 audit[11110]: CRED_DISP pid=11110 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:13.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.101:22-147.75.109.163:51958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:15.883000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:28:15.883000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0019e52e0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:28:15.883000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:28:16.073000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:28:16.073000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001e8f2c0 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:28:16.073000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:28:18.680455 systemd[1]: Started sshd@58-139.178.90.101:22-147.75.109.163:45352.service. Feb 9 07:28:18.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.101:22-147.75.109.163:45352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:18.707307 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 07:28:18.707397 kernel: audit: type=1130 audit(1707463698.679:2039): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.101:22-147.75.109.163:45352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:18.818000 audit[11137]: USER_ACCT pid=11137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:18.819759 sshd[11137]: Accepted publickey for core from 147.75.109.163 port 45352 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:28:18.821624 sshd[11137]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:28:18.824170 systemd-logind[1462]: New session 40 of user core. Feb 9 07:28:18.824766 systemd[1]: Started session-40.scope. Feb 9 07:28:18.904865 sshd[11137]: pam_unix(sshd:session): session closed for user core Feb 9 07:28:18.906178 systemd[1]: sshd@58-139.178.90.101:22-147.75.109.163:45352.service: Deactivated successfully. Feb 9 07:28:18.906614 systemd[1]: session-40.scope: Deactivated successfully. Feb 9 07:28:18.906967 systemd-logind[1462]: Session 40 logged out. Waiting for processes to exit. Feb 9 07:28:18.907393 systemd-logind[1462]: Removed session 40. Feb 9 07:28:18.819000 audit[11137]: CRED_ACQ pid=11137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:19.001980 kernel: audit: type=1101 audit(1707463698.818:2040): pid=11137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:19.002024 kernel: audit: type=1103 audit(1707463698.819:2041): pid=11137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:19.002045 kernel: audit: type=1006 audit(1707463698.819:2042): pid=11137 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=40 res=1 Feb 9 07:28:19.060625 kernel: audit: type=1300 audit(1707463698.819:2042): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd06ec0930 a2=3 a3=0 items=0 ppid=1 pid=11137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:18.819000 audit[11137]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd06ec0930 a2=3 a3=0 items=0 ppid=1 pid=11137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:18.819000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:19.183118 kernel: audit: type=1327 audit(1707463698.819:2042): proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:19.183148 kernel: audit: type=1105 audit(1707463698.825:2043): pid=11137 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:18.825000 audit[11137]: USER_START pid=11137 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:19.277708 kernel: audit: type=1103 audit(1707463698.826:2044): pid=11141 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:18.826000 audit[11141]: CRED_ACQ pid=11141 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:19.366952 kernel: audit: type=1106 audit(1707463698.903:2045): pid=11137 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:18.903000 audit[11137]: USER_END pid=11137 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:19.462443 kernel: audit: type=1104 audit(1707463698.904:2046): pid=11137 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:18.904000 audit[11137]: CRED_DISP pid=11137 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:18.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.101:22-147.75.109.163:45352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:19.893000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:19.893000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001abb180 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:28:19.893000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:28:19.893000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:19.893000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028805a0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:28:19.893000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:28:19.943000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:19.943000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00f395ce0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:28:19.943000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:28:19.943000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:19.943000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0135c3380 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:28:19.943000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:28:19.944000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:19.944000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:19.944000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0135c33a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:28:19.944000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c007968270 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:28:19.944000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:28:19.944000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:28:19.944000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:19.944000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00701b200 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:28:19.944000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:28:19.983000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:19.983000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c01010b080 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:28:19.983000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:28:23.914757 systemd[1]: Started sshd@59-139.178.90.101:22-147.75.109.163:45364.service. Feb 9 07:28:23.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.101:22-147.75.109.163:45364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:23.941643 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 07:28:23.941740 kernel: audit: type=1130 audit(1707463703.913:2056): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.101:22-147.75.109.163:45364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:24.036000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:24.054475 sshd[11194]: Accepted publickey for core from 147.75.109.163 port 45364 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:28:24.055808 sshd[11194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:28:24.058461 systemd-logind[1462]: New session 41 of user core. Feb 9 07:28:24.058945 systemd[1]: Started session-41.scope. Feb 9 07:28:24.036000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:24.142620 sshd[11194]: pam_unix(sshd:session): session closed for user core Feb 9 07:28:24.144140 systemd[1]: sshd@59-139.178.90.101:22-147.75.109.163:45364.service: Deactivated successfully. Feb 9 07:28:24.144580 systemd[1]: session-41.scope: Deactivated successfully. Feb 9 07:28:24.144984 systemd-logind[1462]: Session 41 logged out. Waiting for processes to exit. Feb 9 07:28:24.145438 systemd-logind[1462]: Removed session 41. Feb 9 07:28:24.216323 kernel: audit: type=1400 audit(1707463704.036:2057): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:24.216366 kernel: audit: type=1400 audit(1707463704.036:2058): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:24.216385 kernel: audit: type=1300 audit(1707463704.036:2057): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00015f5c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:28:24.036000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00015f5c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:28:24.335869 kernel: audit: type=1300 audit(1707463704.036:2058): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007d07e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:28:24.036000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007d07e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:28:24.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:28:24.548314 kernel: audit: type=1327 audit(1707463704.036:2058): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:28:24.548351 kernel: audit: type=1327 audit(1707463704.036:2057): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:28:24.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:28:24.641520 kernel: audit: type=1400 audit(1707463704.036:2059): avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:24.036000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:24.036000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ea90c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:28:24.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:28:24.944580 kernel: audit: type=1300 audit(1707463704.036:2059): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ea90c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:28:24.944624 kernel: audit: type=1327 audit(1707463704.036:2059): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:28:24.036000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:28:24.036000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c0016362e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:28:24.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:28:24.052000 audit[11194]: USER_ACCT pid=11194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:24.054000 audit[11194]: CRED_ACQ pid=11194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:24.054000 audit[11194]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8fdfea00 a2=3 a3=0 items=0 ppid=1 pid=11194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:24.054000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:24.060000 audit[11194]: USER_START pid=11194 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:24.060000 audit[11216]: CRED_ACQ pid=11216 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:24.141000 audit[11194]: USER_END pid=11194 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:24.141000 audit[11194]: CRED_DISP pid=11194 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:24.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.101:22-147.75.109.163:45364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:29.152828 systemd[1]: Started sshd@60-139.178.90.101:22-147.75.109.163:46354.service. Feb 9 07:28:29.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.101:22-147.75.109.163:46354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:29.180217 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 07:28:29.180306 kernel: audit: type=1130 audit(1707463709.151:2069): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.101:22-147.75.109.163:46354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:29.203308 sshd[11261]: Accepted publickey for core from 147.75.109.163 port 46354 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:28:29.204645 sshd[11261]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:28:29.207247 systemd-logind[1462]: New session 42 of user core. Feb 9 07:28:29.207904 systemd[1]: Started session-42.scope. Feb 9 07:28:29.201000 audit[11261]: USER_ACCT pid=11261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:29.289230 sshd[11261]: pam_unix(sshd:session): session closed for user core Feb 9 07:28:29.290621 systemd[1]: sshd@60-139.178.90.101:22-147.75.109.163:46354.service: Deactivated successfully. Feb 9 07:28:29.291082 systemd[1]: session-42.scope: Deactivated successfully. Feb 9 07:28:29.291400 systemd-logind[1462]: Session 42 logged out. Waiting for processes to exit. Feb 9 07:28:29.291929 systemd-logind[1462]: Removed session 42. Feb 9 07:28:29.364380 kernel: audit: type=1101 audit(1707463709.201:2070): pid=11261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:29.364419 kernel: audit: type=1103 audit(1707463709.202:2071): pid=11261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:29.202000 audit[11261]: CRED_ACQ pid=11261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:29.514076 kernel: audit: type=1006 audit(1707463709.202:2072): pid=11261 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=42 res=1 Feb 9 07:28:29.514112 kernel: audit: type=1300 audit(1707463709.202:2072): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8ec028f0 a2=3 a3=0 items=0 ppid=1 pid=11261 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:29.202000 audit[11261]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8ec028f0 a2=3 a3=0 items=0 ppid=1 pid=11261 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:29.202000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:29.637885 kernel: audit: type=1327 audit(1707463709.202:2072): proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:29.637924 kernel: audit: type=1105 audit(1707463709.208:2073): pid=11261 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:29.208000 audit[11261]: USER_START pid=11261 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:29.733631 kernel: audit: type=1103 audit(1707463709.209:2074): pid=11263 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:29.209000 audit[11263]: CRED_ACQ pid=11263 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:29.288000 audit[11261]: USER_END pid=11261 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:29.919222 kernel: audit: type=1106 audit(1707463709.288:2075): pid=11261 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:29.919259 kernel: audit: type=1104 audit(1707463709.288:2076): pid=11261 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:29.288000 audit[11261]: CRED_DISP pid=11261 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:29.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.101:22-147.75.109.163:46354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:30.558820 systemd[1]: Started sshd@61-139.178.90.101:22-74.121.149.150:55344.service. Feb 9 07:28:30.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.101:22-74.121.149.150:55344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:34.298534 systemd[1]: Started sshd@62-139.178.90.101:22-147.75.109.163:46366.service. Feb 9 07:28:34.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.101:22-147.75.109.163:46366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:34.325847 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:28:34.325913 kernel: audit: type=1130 audit(1707463714.297:2079): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.101:22-147.75.109.163:46366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:34.435000 audit[11328]: USER_ACCT pid=11328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:34.437610 sshd[11328]: Accepted publickey for core from 147.75.109.163 port 46366 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:28:34.438781 sshd[11328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:28:34.441079 systemd-logind[1462]: New session 43 of user core. Feb 9 07:28:34.441595 systemd[1]: Started session-43.scope. Feb 9 07:28:34.520652 sshd[11328]: pam_unix(sshd:session): session closed for user core Feb 9 07:28:34.521966 systemd[1]: sshd@62-139.178.90.101:22-147.75.109.163:46366.service: Deactivated successfully. Feb 9 07:28:34.522431 systemd[1]: session-43.scope: Deactivated successfully. Feb 9 07:28:34.522867 systemd-logind[1462]: Session 43 logged out. Waiting for processes to exit. Feb 9 07:28:34.523361 systemd-logind[1462]: Removed session 43. Feb 9 07:28:34.437000 audit[11328]: CRED_ACQ pid=11328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:34.619773 kernel: audit: type=1101 audit(1707463714.435:2080): pid=11328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:34.619824 kernel: audit: type=1103 audit(1707463714.437:2081): pid=11328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:34.619843 kernel: audit: type=1006 audit(1707463714.437:2082): pid=11328 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=43 res=1 Feb 9 07:28:34.437000 audit[11328]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc68dd25d0 a2=3 a3=0 items=0 ppid=1 pid=11328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:34.770431 kernel: audit: type=1300 audit(1707463714.437:2082): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc68dd25d0 a2=3 a3=0 items=0 ppid=1 pid=11328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:34.770467 kernel: audit: type=1327 audit(1707463714.437:2082): proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:34.437000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:34.800894 kernel: audit: type=1105 audit(1707463714.442:2083): pid=11328 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:34.442000 audit[11328]: USER_START pid=11328 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:34.895456 kernel: audit: type=1103 audit(1707463714.442:2084): pid=11330 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:34.442000 audit[11330]: CRED_ACQ pid=11330 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:34.984742 kernel: audit: type=1106 audit(1707463714.519:2085): pid=11328 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:34.519000 audit[11328]: USER_END pid=11328 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:34.519000 audit[11328]: CRED_DISP pid=11328 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:35.169778 kernel: audit: type=1104 audit(1707463714.519:2086): pid=11328 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:34.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.101:22-147.75.109.163:46366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:39.530303 systemd[1]: Started sshd@63-139.178.90.101:22-147.75.109.163:41872.service. Feb 9 07:28:39.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.101:22-147.75.109.163:41872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:39.557404 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:28:39.557474 kernel: audit: type=1130 audit(1707463719.528:2088): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.101:22-147.75.109.163:41872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:39.669000 audit[11355]: USER_ACCT pid=11355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:39.670975 sshd[11355]: Accepted publickey for core from 147.75.109.163 port 41872 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:28:39.671787 sshd[11355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:28:39.674189 systemd-logind[1462]: New session 44 of user core. Feb 9 07:28:39.674638 systemd[1]: Started session-44.scope. Feb 9 07:28:39.757377 sshd[11355]: pam_unix(sshd:session): session closed for user core Feb 9 07:28:39.758825 systemd[1]: sshd@63-139.178.90.101:22-147.75.109.163:41872.service: Deactivated successfully. Feb 9 07:28:39.759271 systemd[1]: session-44.scope: Deactivated successfully. Feb 9 07:28:39.759630 systemd-logind[1462]: Session 44 logged out. Waiting for processes to exit. Feb 9 07:28:39.760060 systemd-logind[1462]: Removed session 44. Feb 9 07:28:39.670000 audit[11355]: CRED_ACQ pid=11355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:39.852950 kernel: audit: type=1101 audit(1707463719.669:2089): pid=11355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:39.852995 kernel: audit: type=1103 audit(1707463719.670:2090): pid=11355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:39.853013 kernel: audit: type=1006 audit(1707463719.670:2091): pid=11355 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=44 res=1 Feb 9 07:28:39.911590 kernel: audit: type=1300 audit(1707463719.670:2091): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef103d7d0 a2=3 a3=0 items=0 ppid=1 pid=11355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:39.670000 audit[11355]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef103d7d0 a2=3 a3=0 items=0 ppid=1 pid=11355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:39.670000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:40.034162 kernel: audit: type=1327 audit(1707463719.670:2091): proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:40.034199 kernel: audit: type=1105 audit(1707463719.675:2092): pid=11355 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:39.675000 audit[11355]: USER_START pid=11355 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:40.128701 kernel: audit: type=1103 audit(1707463719.676:2093): pid=11358 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:39.676000 audit[11358]: CRED_ACQ pid=11358 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:39.756000 audit[11355]: USER_END pid=11355 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:40.218566 kernel: audit: type=1106 audit(1707463719.756:2094): pid=11355 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:39.756000 audit[11355]: CRED_DISP pid=11355 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:40.402989 kernel: audit: type=1104 audit(1707463719.756:2095): pid=11355 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:39.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.101:22-147.75.109.163:41872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:42.662889 sshd[11288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.121.149.150 user=root Feb 9 07:28:42.661000 audit[11288]: USER_AUTH pid=11288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:28:44.355754 sshd[11288]: Failed password for root from 74.121.149.150 port 55344 ssh2 Feb 9 07:28:44.766299 systemd[1]: Started sshd@64-139.178.90.101:22-147.75.109.163:57600.service. Feb 9 07:28:44.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.101:22-147.75.109.163:57600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:44.793297 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:28:44.793350 kernel: audit: type=1130 audit(1707463724.764:2098): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.101:22-147.75.109.163:57600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:44.903000 audit[11382]: USER_ACCT pid=11382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:44.905592 sshd[11382]: Accepted publickey for core from 147.75.109.163 port 57600 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:28:44.906807 sshd[11382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:28:44.909126 systemd-logind[1462]: New session 45 of user core. Feb 9 07:28:44.909584 systemd[1]: Started session-45.scope. Feb 9 07:28:44.989368 sshd[11382]: pam_unix(sshd:session): session closed for user core Feb 9 07:28:44.991176 systemd[1]: sshd@64-139.178.90.101:22-147.75.109.163:57600.service: Deactivated successfully. Feb 9 07:28:44.991547 systemd[1]: session-45.scope: Deactivated successfully. Feb 9 07:28:44.991949 systemd-logind[1462]: Session 45 logged out. Waiting for processes to exit. Feb 9 07:28:44.992504 systemd[1]: Started sshd@65-139.178.90.101:22-147.75.109.163:57608.service. Feb 9 07:28:44.992891 systemd-logind[1462]: Removed session 45. Feb 9 07:28:44.905000 audit[11382]: CRED_ACQ pid=11382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.087569 kernel: audit: type=1101 audit(1707463724.903:2099): pid=11382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.087619 kernel: audit: type=1103 audit(1707463724.905:2100): pid=11382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.087637 kernel: audit: type=1006 audit(1707463724.905:2101): pid=11382 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=45 res=1 Feb 9 07:28:45.110707 sshd[11408]: Accepted publickey for core from 147.75.109.163 port 57608 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:28:45.112774 sshd[11408]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:28:45.115168 systemd-logind[1462]: New session 46 of user core. Feb 9 07:28:45.115674 systemd[1]: Started session-46.scope. Feb 9 07:28:45.146266 kernel: audit: type=1300 audit(1707463724.905:2101): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7f0f7290 a2=3 a3=0 items=0 ppid=1 pid=11382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:44.905000 audit[11382]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7f0f7290 a2=3 a3=0 items=0 ppid=1 pid=11382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:44.905000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:45.268906 kernel: audit: type=1327 audit(1707463724.905:2101): proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:45.268951 kernel: audit: type=1105 audit(1707463724.910:2102): pid=11382 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:44.910000 audit[11382]: USER_START pid=11382 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:44.910000 audit[11384]: CRED_ACQ pid=11384 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.452795 kernel: audit: type=1103 audit(1707463724.910:2103): pid=11384 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.452874 kernel: audit: type=1106 audit(1707463724.988:2104): pid=11382 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:44.988000 audit[11382]: USER_END pid=11382 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:44.988000 audit[11382]: CRED_DISP pid=11382 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.583659 sshd[11408]: pam_unix(sshd:session): session closed for user core Feb 9 07:28:45.585501 systemd[1]: sshd@65-139.178.90.101:22-147.75.109.163:57608.service: Deactivated successfully. Feb 9 07:28:45.585888 systemd[1]: session-46.scope: Deactivated successfully. Feb 9 07:28:45.586206 systemd-logind[1462]: Session 46 logged out. Waiting for processes to exit. Feb 9 07:28:45.586854 systemd[1]: Started sshd@66-139.178.90.101:22-147.75.109.163:57620.service. Feb 9 07:28:45.587244 systemd-logind[1462]: Removed session 46. Feb 9 07:28:45.637699 kernel: audit: type=1104 audit(1707463724.988:2105): pid=11382 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:44.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.101:22-147.75.109.163:57600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:44.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.101:22-147.75.109.163:57608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:45.109000 audit[11408]: USER_ACCT pid=11408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.111000 audit[11408]: CRED_ACQ pid=11408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.111000 audit[11408]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce99df240 a2=3 a3=0 items=0 ppid=1 pid=11408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:45.111000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:45.116000 audit[11408]: USER_START pid=11408 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.117000 audit[11410]: CRED_ACQ pid=11410 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.582000 audit[11408]: USER_END pid=11408 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.582000 audit[11408]: CRED_DISP pid=11408 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.101:22-147.75.109.163:57608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:45.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.101:22-147.75.109.163:57620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:45.659000 audit[11431]: USER_ACCT pid=11431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.661101 sshd[11431]: Accepted publickey for core from 147.75.109.163 port 57620 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:28:45.660000 audit[11431]: CRED_ACQ pid=11431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.660000 audit[11431]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3997c630 a2=3 a3=0 items=0 ppid=1 pid=11431 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:45.660000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:45.661893 sshd[11431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:28:45.664455 systemd-logind[1462]: New session 47 of user core. Feb 9 07:28:45.664961 systemd[1]: Started session-47.scope. Feb 9 07:28:45.665000 audit[11431]: USER_START pid=11431 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.666000 audit[11433]: CRED_ACQ pid=11433 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.791670 sshd[11431]: pam_unix(sshd:session): session closed for user core Feb 9 07:28:45.790000 audit[11431]: USER_END pid=11431 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.790000 audit[11431]: CRED_DISP pid=11431 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:45.793148 systemd[1]: sshd@66-139.178.90.101:22-147.75.109.163:57620.service: Deactivated successfully. Feb 9 07:28:45.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.101:22-147.75.109.163:57620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:45.793620 systemd[1]: session-47.scope: Deactivated successfully. Feb 9 07:28:45.794020 systemd-logind[1462]: Session 47 logged out. Waiting for processes to exit. Feb 9 07:28:45.794443 systemd-logind[1462]: Removed session 47. Feb 9 07:28:46.150467 sshd[11288]: Received disconnect from 74.121.149.150 port 55344:11: Bye Bye [preauth] Feb 9 07:28:46.150467 sshd[11288]: Disconnected from authenticating user root 74.121.149.150 port 55344 [preauth] Feb 9 07:28:46.152745 systemd[1]: sshd@61-139.178.90.101:22-74.121.149.150:55344.service: Deactivated successfully. Feb 9 07:28:46.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.101:22-74.121.149.150:55344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:50.800921 systemd[1]: Started sshd@67-139.178.90.101:22-147.75.109.163:57624.service. Feb 9 07:28:50.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.101:22-147.75.109.163:57624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:50.827863 kernel: kauditd_printk_skb: 24 callbacks suppressed Feb 9 07:28:50.827940 kernel: audit: type=1130 audit(1707463730.799:2126): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.101:22-147.75.109.163:57624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:50.850847 sshd[11484]: Accepted publickey for core from 147.75.109.163 port 57624 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:28:50.852828 sshd[11484]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:28:50.855088 systemd-logind[1462]: New session 48 of user core. Feb 9 07:28:50.855632 systemd[1]: Started session-48.scope. Feb 9 07:28:50.849000 audit[11484]: USER_ACCT pid=11484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:50.916505 kernel: audit: type=1101 audit(1707463730.849:2127): pid=11484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:50.935291 sshd[11484]: pam_unix(sshd:session): session closed for user core Feb 9 07:28:50.936671 systemd[1]: sshd@67-139.178.90.101:22-147.75.109.163:57624.service: Deactivated successfully. Feb 9 07:28:50.937103 systemd[1]: session-48.scope: Deactivated successfully. Feb 9 07:28:50.937404 systemd-logind[1462]: Session 48 logged out. Waiting for processes to exit. Feb 9 07:28:50.937963 systemd-logind[1462]: Removed session 48. Feb 9 07:28:50.851000 audit[11484]: CRED_ACQ pid=11484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:51.098074 kernel: audit: type=1103 audit(1707463730.851:2128): pid=11484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:51.098112 kernel: audit: type=1006 audit(1707463730.851:2129): pid=11484 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=48 res=1 Feb 9 07:28:50.851000 audit[11484]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc995b1d0 a2=3 a3=0 items=0 ppid=1 pid=11484 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:51.248830 kernel: audit: type=1300 audit(1707463730.851:2129): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc995b1d0 a2=3 a3=0 items=0 ppid=1 pid=11484 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:51.248861 kernel: audit: type=1327 audit(1707463730.851:2129): proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:50.851000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:51.279354 kernel: audit: type=1105 audit(1707463730.856:2130): pid=11484 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:50.856000 audit[11484]: USER_START pid=11484 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:51.373931 kernel: audit: type=1103 audit(1707463730.856:2131): pid=11486 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:50.856000 audit[11486]: CRED_ACQ pid=11486 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:51.463264 kernel: audit: type=1106 audit(1707463730.934:2132): pid=11484 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:50.934000 audit[11484]: USER_END pid=11484 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:51.558884 kernel: audit: type=1104 audit(1707463730.934:2133): pid=11484 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:50.934000 audit[11484]: CRED_DISP pid=11484 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:50.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.101:22-147.75.109.163:57624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:55.944913 systemd[1]: Started sshd@68-139.178.90.101:22-147.75.109.163:36020.service. Feb 9 07:28:55.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.101:22-147.75.109.163:36020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:55.971959 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:28:55.972058 kernel: audit: type=1130 audit(1707463735.943:2135): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.101:22-147.75.109.163:36020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:28:56.083000 audit[11547]: USER_ACCT pid=11547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:56.085063 sshd[11547]: Accepted publickey for core from 147.75.109.163 port 36020 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:28:56.087795 sshd[11547]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:28:56.090215 systemd-logind[1462]: New session 49 of user core. Feb 9 07:28:56.090673 systemd[1]: Started session-49.scope. Feb 9 07:28:56.170304 sshd[11547]: pam_unix(sshd:session): session closed for user core Feb 9 07:28:56.171791 systemd[1]: sshd@68-139.178.90.101:22-147.75.109.163:36020.service: Deactivated successfully. Feb 9 07:28:56.172233 systemd[1]: session-49.scope: Deactivated successfully. Feb 9 07:28:56.172515 systemd-logind[1462]: Session 49 logged out. Waiting for processes to exit. Feb 9 07:28:56.173064 systemd-logind[1462]: Removed session 49. Feb 9 07:28:56.176525 kernel: audit: type=1101 audit(1707463736.083:2136): pid=11547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:56.176563 kernel: audit: type=1103 audit(1707463736.086:2137): pid=11547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:56.086000 audit[11547]: CRED_ACQ pid=11547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:56.326043 kernel: audit: type=1006 audit(1707463736.086:2138): pid=11547 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=49 res=1 Feb 9 07:28:56.326083 kernel: audit: type=1300 audit(1707463736.086:2138): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffee195e30 a2=3 a3=0 items=0 ppid=1 pid=11547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:56.086000 audit[11547]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffee195e30 a2=3 a3=0 items=0 ppid=1 pid=11547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:28:56.418211 kernel: audit: type=1327 audit(1707463736.086:2138): proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:56.086000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:28:56.448727 kernel: audit: type=1105 audit(1707463736.091:2139): pid=11547 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:56.091000 audit[11547]: USER_START pid=11547 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:56.543368 kernel: audit: type=1103 audit(1707463736.091:2140): pid=11549 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:56.091000 audit[11549]: CRED_ACQ pid=11549 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:56.169000 audit[11547]: USER_END pid=11547 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:56.728482 kernel: audit: type=1106 audit(1707463736.169:2141): pid=11547 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:56.728542 kernel: audit: type=1104 audit(1707463736.169:2142): pid=11547 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:56.169000 audit[11547]: CRED_DISP pid=11547 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:28:56.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.101:22-147.75.109.163:36020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:01.180039 systemd[1]: Started sshd@69-139.178.90.101:22-147.75.109.163:36024.service. Feb 9 07:29:01.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.101:22-147.75.109.163:36024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:01.207061 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:29:01.207117 kernel: audit: type=1130 audit(1707463741.178:2144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.101:22-147.75.109.163:36024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:01.318000 audit[11572]: USER_ACCT pid=11572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:01.319681 sshd[11572]: Accepted publickey for core from 147.75.109.163 port 36024 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:29:01.321224 sshd[11572]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:29:01.323542 systemd-logind[1462]: New session 50 of user core. Feb 9 07:29:01.324050 systemd[1]: Started session-50.scope. Feb 9 07:29:01.405965 sshd[11572]: pam_unix(sshd:session): session closed for user core Feb 9 07:29:01.407504 systemd[1]: sshd@69-139.178.90.101:22-147.75.109.163:36024.service: Deactivated successfully. Feb 9 07:29:01.407950 systemd[1]: session-50.scope: Deactivated successfully. Feb 9 07:29:01.408365 systemd-logind[1462]: Session 50 logged out. Waiting for processes to exit. Feb 9 07:29:01.409031 systemd-logind[1462]: Removed session 50. Feb 9 07:29:01.319000 audit[11572]: CRED_ACQ pid=11572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:01.501779 kernel: audit: type=1101 audit(1707463741.318:2145): pid=11572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:01.501821 kernel: audit: type=1103 audit(1707463741.319:2146): pid=11572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:01.501838 kernel: audit: type=1006 audit(1707463741.319:2147): pid=11572 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=50 res=1 Feb 9 07:29:01.560479 kernel: audit: type=1300 audit(1707463741.319:2147): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7fd8a6e0 a2=3 a3=0 items=0 ppid=1 pid=11572 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:01.319000 audit[11572]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7fd8a6e0 a2=3 a3=0 items=0 ppid=1 pid=11572 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:01.319000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:01.683108 kernel: audit: type=1327 audit(1707463741.319:2147): proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:01.683140 kernel: audit: type=1105 audit(1707463741.324:2148): pid=11572 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:01.324000 audit[11572]: USER_START pid=11572 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:01.777727 kernel: audit: type=1103 audit(1707463741.325:2149): pid=11574 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:01.325000 audit[11574]: CRED_ACQ pid=11574 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:01.405000 audit[11572]: USER_END pid=11572 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:01.962673 kernel: audit: type=1106 audit(1707463741.405:2150): pid=11572 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:01.962708 kernel: audit: type=1104 audit(1707463741.405:2151): pid=11572 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:01.405000 audit[11572]: CRED_DISP pid=11572 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:01.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.101:22-147.75.109.163:36024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:05.815119 systemd[1]: Started sshd@70-139.178.90.101:22-218.92.0.52:55512.service. Feb 9 07:29:05.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.101:22-218.92.0.52:55512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:06.415983 sshd[11615]: Unable to negotiate with 218.92.0.52 port 55512: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 07:29:06.416324 systemd[1]: Started sshd@71-139.178.90.101:22-147.75.109.163:55880.service. Feb 9 07:29:06.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.101:22-147.75.109.163:55880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:06.416706 systemd[1]: sshd@70-139.178.90.101:22-218.92.0.52:55512.service: Deactivated successfully. Feb 9 07:29:06.443284 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:29:06.443375 kernel: audit: type=1130 audit(1707463746.414:2154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.101:22-147.75.109.163:55880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:06.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.101:22-218.92.0.52:55512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:06.554131 sshd[11618]: Accepted publickey for core from 147.75.109.163 port 55880 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:29:06.555490 sshd[11618]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:29:06.557791 systemd-logind[1462]: New session 51 of user core. Feb 9 07:29:06.558244 systemd[1]: Started session-51.scope. Feb 9 07:29:06.618837 kernel: audit: type=1131 audit(1707463746.415:2155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.101:22-218.92.0.52:55512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:06.618912 kernel: audit: type=1101 audit(1707463746.552:2156): pid=11618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:06.552000 audit[11618]: USER_ACCT pid=11618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:06.637477 sshd[11618]: pam_unix(sshd:session): session closed for user core Feb 9 07:29:06.638822 systemd[1]: sshd@71-139.178.90.101:22-147.75.109.163:55880.service: Deactivated successfully. Feb 9 07:29:06.639262 systemd[1]: session-51.scope: Deactivated successfully. Feb 9 07:29:06.639649 systemd-logind[1462]: Session 51 logged out. Waiting for processes to exit. Feb 9 07:29:06.640173 systemd-logind[1462]: Removed session 51. Feb 9 07:29:06.553000 audit[11618]: CRED_ACQ pid=11618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:06.801396 kernel: audit: type=1103 audit(1707463746.553:2157): pid=11618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:06.801437 kernel: audit: type=1006 audit(1707463746.553:2158): pid=11618 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=51 res=1 Feb 9 07:29:06.860064 kernel: audit: type=1300 audit(1707463746.553:2158): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0b8aaa70 a2=3 a3=0 items=0 ppid=1 pid=11618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:06.553000 audit[11618]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0b8aaa70 a2=3 a3=0 items=0 ppid=1 pid=11618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:06.553000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:06.982521 kernel: audit: type=1327 audit(1707463746.553:2158): proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:06.982555 kernel: audit: type=1105 audit(1707463746.558:2159): pid=11618 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:06.558000 audit[11618]: USER_START pid=11618 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:06.559000 audit[11621]: CRED_ACQ pid=11621 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:07.078558 kernel: audit: type=1103 audit(1707463746.559:2160): pid=11621 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:06.636000 audit[11618]: USER_END pid=11618 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:07.262752 kernel: audit: type=1106 audit(1707463746.636:2161): pid=11618 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:06.636000 audit[11618]: CRED_DISP pid=11618 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:06.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.101:22-147.75.109.163:55880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:11.646879 systemd[1]: Started sshd@72-139.178.90.101:22-147.75.109.163:55884.service. Feb 9 07:29:11.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.101:22-147.75.109.163:55884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:11.674050 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:29:11.674104 kernel: audit: type=1130 audit(1707463751.645:2164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.101:22-147.75.109.163:55884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:11.787000 audit[11646]: USER_ACCT pid=11646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:11.788089 sshd[11646]: Accepted publickey for core from 147.75.109.163 port 55884 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:29:11.788783 sshd[11646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:29:11.791143 systemd-logind[1462]: New session 52 of user core. Feb 9 07:29:11.791588 systemd[1]: Started session-52.scope. Feb 9 07:29:11.871995 sshd[11646]: pam_unix(sshd:session): session closed for user core Feb 9 07:29:11.873387 systemd[1]: sshd@72-139.178.90.101:22-147.75.109.163:55884.service: Deactivated successfully. Feb 9 07:29:11.873827 systemd[1]: session-52.scope: Deactivated successfully. Feb 9 07:29:11.874197 systemd-logind[1462]: Session 52 logged out. Waiting for processes to exit. Feb 9 07:29:11.874597 systemd-logind[1462]: Removed session 52. Feb 9 07:29:11.787000 audit[11646]: CRED_ACQ pid=11646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:11.971049 kernel: audit: type=1101 audit(1707463751.787:2165): pid=11646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:11.971097 kernel: audit: type=1103 audit(1707463751.787:2166): pid=11646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:11.971115 kernel: audit: type=1006 audit(1707463751.787:2167): pid=11646 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=52 res=1 Feb 9 07:29:12.030103 kernel: audit: type=1300 audit(1707463751.787:2167): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb1f71940 a2=3 a3=0 items=0 ppid=1 pid=11646 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:11.787000 audit[11646]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb1f71940 a2=3 a3=0 items=0 ppid=1 pid=11646 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:12.122674 kernel: audit: type=1327 audit(1707463751.787:2167): proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:11.787000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:12.153323 kernel: audit: type=1105 audit(1707463751.792:2168): pid=11646 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:11.792000 audit[11646]: USER_START pid=11646 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:12.248335 kernel: audit: type=1103 audit(1707463751.792:2169): pid=11649 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:11.792000 audit[11649]: CRED_ACQ pid=11649 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:11.871000 audit[11646]: USER_END pid=11646 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:12.434287 kernel: audit: type=1106 audit(1707463751.871:2170): pid=11646 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:12.434326 kernel: audit: type=1104 audit(1707463751.871:2171): pid=11646 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:11.871000 audit[11646]: CRED_DISP pid=11646 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:11.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.101:22-147.75.109.163:55884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:15.884000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:29:15.884000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0021299c0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:29:15.884000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:29:16.074000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:29:16.074000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001e8f560 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:29:16.074000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:29:16.885700 systemd[1]: Started sshd@73-139.178.90.101:22-147.75.109.163:40122.service. Feb 9 07:29:16.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.101:22-147.75.109.163:40122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:16.925055 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 07:29:16.925126 kernel: audit: type=1130 audit(1707463756.884:2175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.101:22-147.75.109.163:40122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:17.036000 audit[11673]: USER_ACCT pid=11673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:17.038242 sshd[11673]: Accepted publickey for core from 147.75.109.163 port 40122 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:29:17.039782 sshd[11673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:29:17.042198 systemd-logind[1462]: New session 53 of user core. Feb 9 07:29:17.042908 systemd[1]: Started session-53.scope. Feb 9 07:29:17.126641 sshd[11673]: pam_unix(sshd:session): session closed for user core Feb 9 07:29:17.128118 systemd[1]: sshd@73-139.178.90.101:22-147.75.109.163:40122.service: Deactivated successfully. Feb 9 07:29:17.128626 systemd[1]: session-53.scope: Deactivated successfully. Feb 9 07:29:17.128989 systemd-logind[1462]: Session 53 logged out. Waiting for processes to exit. Feb 9 07:29:17.129376 systemd-logind[1462]: Removed session 53. Feb 9 07:29:17.038000 audit[11673]: CRED_ACQ pid=11673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:17.222584 kernel: audit: type=1101 audit(1707463757.036:2176): pid=11673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:17.222620 kernel: audit: type=1103 audit(1707463757.038:2177): pid=11673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:17.222637 kernel: audit: type=1006 audit(1707463757.038:2178): pid=11673 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=53 res=1 Feb 9 07:29:17.038000 audit[11673]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a73a790 a2=3 a3=0 items=0 ppid=1 pid=11673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:17.374332 kernel: audit: type=1300 audit(1707463757.038:2178): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a73a790 a2=3 a3=0 items=0 ppid=1 pid=11673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:17.374363 kernel: audit: type=1327 audit(1707463757.038:2178): proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:17.038000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:17.043000 audit[11673]: USER_START pid=11673 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:17.500101 kernel: audit: type=1105 audit(1707463757.043:2179): pid=11673 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:17.500133 kernel: audit: type=1103 audit(1707463757.044:2180): pid=11675 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:17.044000 audit[11675]: CRED_ACQ pid=11675 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:17.589407 kernel: audit: type=1106 audit(1707463757.125:2181): pid=11673 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:17.125000 audit[11673]: USER_END pid=11673 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:17.125000 audit[11673]: CRED_DISP pid=11673 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:17.774343 kernel: audit: type=1104 audit(1707463757.125:2182): pid=11673 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:17.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.101:22-147.75.109.163:40122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:19.895000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:29:19.895000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e0cc80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:29:19.895000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:29:19.895000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:29:19.895000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019af3e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:29:19.895000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:29:19.944000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:29:19.944000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0130e4020 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:29:19.944000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:29:19.944000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:29:19.944000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01552f6b0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:29:19.944000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:29:19.946000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:29:19.946000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0180e0ae0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:29:19.946000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:29:19.946000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:29:19.946000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0180e0b10 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:29:19.946000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:29:19.946000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:29:19.946000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0130a6c20 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:29:19.946000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:29:19.984000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:29:19.984000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c018dd2000 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:29:19.984000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:29:22.140969 systemd[1]: Started sshd@74-139.178.90.101:22-147.75.109.163:40134.service. Feb 9 07:29:22.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.101:22-147.75.109.163:40134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:22.168653 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 07:29:22.168747 kernel: audit: type=1130 audit(1707463762.140:2192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.101:22-147.75.109.163:40134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:22.282442 sshd[11740]: Accepted publickey for core from 147.75.109.163 port 40134 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:29:22.280000 audit[11740]: USER_ACCT pid=11740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:22.283666 sshd[11740]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:29:22.285916 systemd-logind[1462]: New session 54 of user core. Feb 9 07:29:22.286684 systemd[1]: Started session-54.scope. Feb 9 07:29:22.366155 sshd[11740]: pam_unix(sshd:session): session closed for user core Feb 9 07:29:22.367609 systemd[1]: sshd@74-139.178.90.101:22-147.75.109.163:40134.service: Deactivated successfully. Feb 9 07:29:22.368090 systemd[1]: session-54.scope: Deactivated successfully. Feb 9 07:29:22.368426 systemd-logind[1462]: Session 54 logged out. Waiting for processes to exit. Feb 9 07:29:22.368923 systemd-logind[1462]: Removed session 54. Feb 9 07:29:22.281000 audit[11740]: CRED_ACQ pid=11740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:22.464549 kernel: audit: type=1101 audit(1707463762.280:2193): pid=11740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:22.464648 kernel: audit: type=1103 audit(1707463762.281:2194): pid=11740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:22.464691 kernel: audit: type=1006 audit(1707463762.282:2195): pid=11740 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=54 res=1 Feb 9 07:29:22.282000 audit[11740]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcff744330 a2=3 a3=0 items=0 ppid=1 pid=11740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:22.615302 kernel: audit: type=1300 audit(1707463762.282:2195): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcff744330 a2=3 a3=0 items=0 ppid=1 pid=11740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:22.615356 kernel: audit: type=1327 audit(1707463762.282:2195): proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:22.282000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:22.287000 audit[11740]: USER_START pid=11740 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:22.740364 kernel: audit: type=1105 audit(1707463762.287:2196): pid=11740 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:22.740416 kernel: audit: type=1103 audit(1707463762.288:2197): pid=11743 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:22.288000 audit[11743]: CRED_ACQ pid=11743 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:22.365000 audit[11740]: USER_END pid=11740 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:22.925127 kernel: audit: type=1106 audit(1707463762.365:2198): pid=11740 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:22.365000 audit[11740]: CRED_DISP pid=11740 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:22.925569 kernel: audit: type=1104 audit(1707463762.365:2199): pid=11740 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:22.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.101:22-147.75.109.163:40134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:24.037000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:29:24.037000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009d1760 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:29:24.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:29:24.037000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:29:24.037000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bc02c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:29:24.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:29:24.037000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:29:24.037000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc02e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:29:24.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:29:24.037000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:29:24.037000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ccc860 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:29:24.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:29:27.377651 systemd[1]: Started sshd@75-139.178.90.101:22-147.75.109.163:51452.service. Feb 9 07:29:27.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.101:22-147.75.109.163:51452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:27.404944 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 07:29:27.405014 kernel: audit: type=1130 audit(1707463767.376:2205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.101:22-147.75.109.163:51452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:27.516000 audit[11808]: USER_ACCT pid=11808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:27.517091 sshd[11808]: Accepted publickey for core from 147.75.109.163 port 51452 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:29:27.518831 sshd[11808]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:29:27.521215 systemd-logind[1462]: New session 55 of user core. Feb 9 07:29:27.521738 systemd[1]: Started session-55.scope. Feb 9 07:29:27.603334 sshd[11808]: pam_unix(sshd:session): session closed for user core Feb 9 07:29:27.604810 systemd[1]: sshd@75-139.178.90.101:22-147.75.109.163:51452.service: Deactivated successfully. Feb 9 07:29:27.605250 systemd[1]: session-55.scope: Deactivated successfully. Feb 9 07:29:27.605544 systemd-logind[1462]: Session 55 logged out. Waiting for processes to exit. Feb 9 07:29:27.606074 systemd-logind[1462]: Removed session 55. Feb 9 07:29:27.517000 audit[11808]: CRED_ACQ pid=11808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:27.699490 kernel: audit: type=1101 audit(1707463767.516:2206): pid=11808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:27.699540 kernel: audit: type=1103 audit(1707463767.517:2207): pid=11808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:27.699559 kernel: audit: type=1006 audit(1707463767.517:2208): pid=11808 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=55 res=1 Feb 9 07:29:27.758122 kernel: audit: type=1300 audit(1707463767.517:2208): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6d1c08c0 a2=3 a3=0 items=0 ppid=1 pid=11808 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:27.517000 audit[11808]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6d1c08c0 a2=3 a3=0 items=0 ppid=1 pid=11808 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:27.850135 kernel: audit: type=1327 audit(1707463767.517:2208): proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:27.517000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:27.522000 audit[11808]: USER_START pid=11808 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:27.975162 kernel: audit: type=1105 audit(1707463767.522:2209): pid=11808 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:27.975199 kernel: audit: type=1103 audit(1707463767.523:2210): pid=11810 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:27.523000 audit[11810]: CRED_ACQ pid=11810 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:28.064437 kernel: audit: type=1106 audit(1707463767.603:2211): pid=11808 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:27.603000 audit[11808]: USER_END pid=11808 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:27.603000 audit[11808]: CRED_DISP pid=11808 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:28.249238 kernel: audit: type=1104 audit(1707463767.603:2212): pid=11808 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:27.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.101:22-147.75.109.163:51452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:32.612293 systemd[1]: Started sshd@76-139.178.90.101:22-147.75.109.163:51464.service. Feb 9 07:29:32.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.101:22-147.75.109.163:51464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:32.638906 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:29:32.639011 kernel: audit: type=1130 audit(1707463772.611:2214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.101:22-147.75.109.163:51464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:32.751000 audit[11834]: USER_ACCT pid=11834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:32.751766 sshd[11834]: Accepted publickey for core from 147.75.109.163 port 51464 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:29:32.752333 sshd[11834]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:29:32.754910 systemd-logind[1462]: New session 56 of user core. Feb 9 07:29:32.755412 systemd[1]: Started session-56.scope. Feb 9 07:29:32.836470 sshd[11834]: pam_unix(sshd:session): session closed for user core Feb 9 07:29:32.838031 systemd[1]: sshd@76-139.178.90.101:22-147.75.109.163:51464.service: Deactivated successfully. Feb 9 07:29:32.838512 systemd[1]: session-56.scope: Deactivated successfully. Feb 9 07:29:32.838960 systemd-logind[1462]: Session 56 logged out. Waiting for processes to exit. Feb 9 07:29:32.839365 systemd-logind[1462]: Removed session 56. Feb 9 07:29:32.751000 audit[11834]: CRED_ACQ pid=11834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:32.935862 kernel: audit: type=1101 audit(1707463772.751:2215): pid=11834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:32.935900 kernel: audit: type=1103 audit(1707463772.751:2216): pid=11834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:32.935919 kernel: audit: type=1006 audit(1707463772.751:2217): pid=11834 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=56 res=1 Feb 9 07:29:32.994575 kernel: audit: type=1300 audit(1707463772.751:2217): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbee2c360 a2=3 a3=0 items=0 ppid=1 pid=11834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:32.751000 audit[11834]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbee2c360 a2=3 a3=0 items=0 ppid=1 pid=11834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:33.086638 kernel: audit: type=1327 audit(1707463772.751:2217): proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:32.751000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:33.117165 kernel: audit: type=1105 audit(1707463772.756:2218): pid=11834 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:32.756000 audit[11834]: USER_START pid=11834 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:32.757000 audit[11836]: CRED_ACQ pid=11836 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:33.301047 kernel: audit: type=1103 audit(1707463772.757:2219): pid=11836 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:33.301083 kernel: audit: type=1106 audit(1707463772.836:2220): pid=11834 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:32.836000 audit[11834]: USER_END pid=11834 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:33.396622 kernel: audit: type=1104 audit(1707463772.836:2221): pid=11834 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:32.836000 audit[11834]: CRED_DISP pid=11834 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:32.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.101:22-147.75.109.163:51464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:37.848726 systemd[1]: Started sshd@77-139.178.90.101:22-147.75.109.163:38412.service. Feb 9 07:29:37.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.101:22-147.75.109.163:38412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:37.876207 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:29:37.876286 kernel: audit: type=1130 audit(1707463777.848:2223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.101:22-147.75.109.163:38412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:37.988936 sshd[11898]: Accepted publickey for core from 147.75.109.163 port 38412 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:29:37.988000 audit[11898]: USER_ACCT pid=11898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:37.990028 sshd[11898]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:29:37.992436 systemd-logind[1462]: New session 57 of user core. Feb 9 07:29:37.993013 systemd[1]: Started session-57.scope. Feb 9 07:29:38.074789 sshd[11898]: pam_unix(sshd:session): session closed for user core Feb 9 07:29:38.076258 systemd[1]: sshd@77-139.178.90.101:22-147.75.109.163:38412.service: Deactivated successfully. Feb 9 07:29:38.076710 systemd[1]: session-57.scope: Deactivated successfully. Feb 9 07:29:38.077057 systemd-logind[1462]: Session 57 logged out. Waiting for processes to exit. Feb 9 07:29:38.077449 systemd-logind[1462]: Removed session 57. Feb 9 07:29:37.989000 audit[11898]: CRED_ACQ pid=11898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:38.172330 kernel: audit: type=1101 audit(1707463777.988:2224): pid=11898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:38.172377 kernel: audit: type=1103 audit(1707463777.989:2225): pid=11898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:38.172395 kernel: audit: type=1006 audit(1707463777.989:2226): pid=11898 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=57 res=1 Feb 9 07:29:38.231096 kernel: audit: type=1300 audit(1707463777.989:2226): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe867c2d40 a2=3 a3=0 items=0 ppid=1 pid=11898 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:37.989000 audit[11898]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe867c2d40 a2=3 a3=0 items=0 ppid=1 pid=11898 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:38.323210 kernel: audit: type=1327 audit(1707463777.989:2226): proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:37.989000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:38.353739 kernel: audit: type=1105 audit(1707463777.994:2227): pid=11898 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:37.994000 audit[11898]: USER_START pid=11898 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:37.995000 audit[11900]: CRED_ACQ pid=11900 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:38.537689 kernel: audit: type=1103 audit(1707463777.995:2228): pid=11900 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:38.537730 kernel: audit: type=1106 audit(1707463778.074:2229): pid=11898 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:38.074000 audit[11898]: USER_END pid=11898 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:38.074000 audit[11898]: CRED_DISP pid=11898 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:38.722583 kernel: audit: type=1104 audit(1707463778.074:2230): pid=11898 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:38.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.101:22-147.75.109.163:38412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:43.086077 systemd[1]: Started sshd@78-139.178.90.101:22-147.75.109.163:38420.service. Feb 9 07:29:43.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.101:22-147.75.109.163:38420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:43.113423 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:29:43.113484 kernel: audit: type=1130 audit(1707463783.085:2232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.101:22-147.75.109.163:38420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:43.224000 audit[11926]: USER_ACCT pid=11926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:43.225075 sshd[11926]: Accepted publickey for core from 147.75.109.163 port 38420 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:29:43.225746 sshd[11926]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:29:43.228158 systemd-logind[1462]: New session 58 of user core. Feb 9 07:29:43.228674 systemd[1]: Started session-58.scope. Feb 9 07:29:43.225000 audit[11926]: CRED_ACQ pid=11926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:43.320465 sshd[11926]: pam_unix(sshd:session): session closed for user core Feb 9 07:29:43.322004 systemd[1]: sshd@78-139.178.90.101:22-147.75.109.163:38420.service: Deactivated successfully. Feb 9 07:29:43.322445 systemd[1]: session-58.scope: Deactivated successfully. Feb 9 07:29:43.322757 systemd-logind[1462]: Session 58 logged out. Waiting for processes to exit. Feb 9 07:29:43.323320 systemd-logind[1462]: Removed session 58. Feb 9 07:29:43.407047 kernel: audit: type=1101 audit(1707463783.224:2233): pid=11926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:43.407093 kernel: audit: type=1103 audit(1707463783.225:2234): pid=11926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:43.407111 kernel: audit: type=1006 audit(1707463783.225:2235): pid=11926 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=58 res=1 Feb 9 07:29:43.225000 audit[11926]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedb84a330 a2=3 a3=0 items=0 ppid=1 pid=11926 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:43.557684 kernel: audit: type=1300 audit(1707463783.225:2235): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedb84a330 a2=3 a3=0 items=0 ppid=1 pid=11926 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:43.557784 kernel: audit: type=1327 audit(1707463783.225:2235): proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:43.225000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:43.230000 audit[11926]: USER_START pid=11926 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:43.682869 kernel: audit: type=1105 audit(1707463783.230:2236): pid=11926 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:43.682956 kernel: audit: type=1103 audit(1707463783.230:2237): pid=11928 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:43.230000 audit[11928]: CRED_ACQ pid=11928 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:43.320000 audit[11926]: USER_END pid=11926 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:43.867841 kernel: audit: type=1106 audit(1707463783.320:2238): pid=11926 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:43.867890 kernel: audit: type=1104 audit(1707463783.320:2239): pid=11926 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:43.320000 audit[11926]: CRED_DISP pid=11926 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:43.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.101:22-147.75.109.163:38420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:48.329727 systemd[1]: Started sshd@79-139.178.90.101:22-147.75.109.163:59200.service. Feb 9 07:29:48.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.101:22-147.75.109.163:59200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:48.356746 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:29:48.356803 kernel: audit: type=1130 audit(1707463788.329:2241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.101:22-147.75.109.163:59200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:48.468000 audit[11951]: USER_ACCT pid=11951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:48.469257 sshd[11951]: Accepted publickey for core from 147.75.109.163 port 59200 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:29:48.470432 sshd[11951]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:29:48.472802 systemd-logind[1462]: New session 59 of user core. Feb 9 07:29:48.473240 systemd[1]: Started session-59.scope. Feb 9 07:29:48.555863 sshd[11951]: pam_unix(sshd:session): session closed for user core Feb 9 07:29:48.557196 systemd[1]: sshd@79-139.178.90.101:22-147.75.109.163:59200.service: Deactivated successfully. Feb 9 07:29:48.557675 systemd[1]: session-59.scope: Deactivated successfully. Feb 9 07:29:48.558036 systemd-logind[1462]: Session 59 logged out. Waiting for processes to exit. Feb 9 07:29:48.558427 systemd-logind[1462]: Removed session 59. Feb 9 07:29:48.469000 audit[11951]: CRED_ACQ pid=11951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:48.651214 kernel: audit: type=1101 audit(1707463788.468:2242): pid=11951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:48.651260 kernel: audit: type=1103 audit(1707463788.469:2243): pid=11951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:48.651280 kernel: audit: type=1006 audit(1707463788.469:2244): pid=11951 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=59 res=1 Feb 9 07:29:48.469000 audit[11951]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb9f54d70 a2=3 a3=0 items=0 ppid=1 pid=11951 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:48.802050 kernel: audit: type=1300 audit(1707463788.469:2244): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb9f54d70 a2=3 a3=0 items=0 ppid=1 pid=11951 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:48.802089 kernel: audit: type=1327 audit(1707463788.469:2244): proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:48.469000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:48.832582 kernel: audit: type=1105 audit(1707463788.474:2245): pid=11951 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:48.474000 audit[11951]: USER_START pid=11951 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:48.927174 kernel: audit: type=1103 audit(1707463788.475:2246): pid=11953 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:48.475000 audit[11953]: CRED_ACQ pid=11953 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:48.555000 audit[11951]: USER_END pid=11951 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:48.556000 audit[11951]: CRED_DISP pid=11951 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:49.201578 kernel: audit: type=1106 audit(1707463788.555:2247): pid=11951 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:49.201616 kernel: audit: type=1104 audit(1707463788.556:2248): pid=11951 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:48.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.101:22-147.75.109.163:59200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:53.565794 systemd[1]: Started sshd@80-139.178.90.101:22-147.75.109.163:59214.service. Feb 9 07:29:53.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.101:22-147.75.109.163:59214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:53.593093 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:29:53.593162 kernel: audit: type=1130 audit(1707463793.565:2250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.101:22-147.75.109.163:59214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:53.705000 audit[12003]: USER_ACCT pid=12003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:53.705702 sshd[12003]: Accepted publickey for core from 147.75.109.163 port 59214 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:29:53.708818 sshd[12003]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:29:53.711228 systemd-logind[1462]: New session 60 of user core. Feb 9 07:29:53.711718 systemd[1]: Started session-60.scope. Feb 9 07:29:53.791445 sshd[12003]: pam_unix(sshd:session): session closed for user core Feb 9 07:29:53.792716 systemd[1]: sshd@80-139.178.90.101:22-147.75.109.163:59214.service: Deactivated successfully. Feb 9 07:29:53.793177 systemd[1]: session-60.scope: Deactivated successfully. Feb 9 07:29:53.793470 systemd-logind[1462]: Session 60 logged out. Waiting for processes to exit. Feb 9 07:29:53.793952 systemd-logind[1462]: Removed session 60. Feb 9 07:29:53.708000 audit[12003]: CRED_ACQ pid=12003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:53.887781 kernel: audit: type=1101 audit(1707463793.705:2251): pid=12003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:53.887819 kernel: audit: type=1103 audit(1707463793.708:2252): pid=12003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:53.887836 kernel: audit: type=1006 audit(1707463793.708:2253): pid=12003 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=60 res=1 Feb 9 07:29:53.708000 audit[12003]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee6b06000 a2=3 a3=0 items=0 ppid=1 pid=12003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:54.038567 kernel: audit: type=1300 audit(1707463793.708:2253): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee6b06000 a2=3 a3=0 items=0 ppid=1 pid=12003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:54.038644 kernel: audit: type=1327 audit(1707463793.708:2253): proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:53.708000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:54.069133 kernel: audit: type=1105 audit(1707463793.713:2254): pid=12003 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:53.713000 audit[12003]: USER_START pid=12003 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:54.163799 kernel: audit: type=1103 audit(1707463793.713:2255): pid=12005 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:53.713000 audit[12005]: CRED_ACQ pid=12005 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:53.791000 audit[12003]: USER_END pid=12003 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:54.253546 kernel: audit: type=1106 audit(1707463793.791:2256): pid=12003 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:53.791000 audit[12003]: CRED_DISP pid=12003 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:54.438137 kernel: audit: type=1104 audit(1707463793.791:2257): pid=12003 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:53.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.101:22-147.75.109.163:59214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:58.801389 systemd[1]: Started sshd@81-139.178.90.101:22-147.75.109.163:60218.service. Feb 9 07:29:58.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.101:22-147.75.109.163:60218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:58.828430 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:29:58.828481 kernel: audit: type=1130 audit(1707463798.800:2259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.101:22-147.75.109.163:60218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:58.939000 audit[12067]: USER_ACCT pid=12067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:58.940033 sshd[12067]: Accepted publickey for core from 147.75.109.163 port 60218 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:29:58.940783 sshd[12067]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:29:58.943176 systemd-logind[1462]: New session 61 of user core. Feb 9 07:29:58.943723 systemd[1]: Started session-61.scope. Feb 9 07:29:59.022219 sshd[12067]: pam_unix(sshd:session): session closed for user core Feb 9 07:29:59.023674 systemd[1]: sshd@81-139.178.90.101:22-147.75.109.163:60218.service: Deactivated successfully. Feb 9 07:29:59.024142 systemd[1]: session-61.scope: Deactivated successfully. Feb 9 07:29:59.024437 systemd-logind[1462]: Session 61 logged out. Waiting for processes to exit. Feb 9 07:29:59.024939 systemd-logind[1462]: Removed session 61. Feb 9 07:29:58.940000 audit[12067]: CRED_ACQ pid=12067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:59.033567 kernel: audit: type=1101 audit(1707463798.939:2260): pid=12067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:59.033614 kernel: audit: type=1103 audit(1707463798.940:2261): pid=12067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:59.182574 kernel: audit: type=1006 audit(1707463798.940:2262): pid=12067 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=61 res=1 Feb 9 07:29:59.182631 kernel: audit: type=1300 audit(1707463798.940:2262): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc96986be0 a2=3 a3=0 items=0 ppid=1 pid=12067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:58.940000 audit[12067]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc96986be0 a2=3 a3=0 items=0 ppid=1 pid=12067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:29:59.274637 kernel: audit: type=1327 audit(1707463798.940:2262): proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:58.940000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:29:59.305148 kernel: audit: type=1105 audit(1707463798.945:2263): pid=12067 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:58.945000 audit[12067]: USER_START pid=12067 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:59.399789 kernel: audit: type=1103 audit(1707463798.945:2264): pid=12069 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:58.945000 audit[12069]: CRED_ACQ pid=12069 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:59.489130 kernel: audit: type=1106 audit(1707463799.022:2265): pid=12067 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:59.022000 audit[12067]: USER_END pid=12067 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:59.584716 kernel: audit: type=1104 audit(1707463799.022:2266): pid=12067 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:59.022000 audit[12067]: CRED_DISP pid=12067 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:29:59.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.101:22-147.75.109.163:60218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:04.031294 systemd[1]: Started sshd@82-139.178.90.101:22-147.75.109.163:60226.service. Feb 9 07:30:04.058332 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:30:04.058380 kernel: audit: type=1130 audit(1707463804.030:2268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.101:22-147.75.109.163:60226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:04.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.101:22-147.75.109.163:60226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:04.171000 audit[12111]: USER_ACCT pid=12111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:04.172101 sshd[12111]: Accepted publickey for core from 147.75.109.163 port 60226 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:30:04.172841 sshd[12111]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:30:04.175259 systemd-logind[1462]: New session 62 of user core. Feb 9 07:30:04.175710 systemd[1]: Started session-62.scope. Feb 9 07:30:04.252947 sshd[12111]: pam_unix(sshd:session): session closed for user core Feb 9 07:30:04.254220 systemd[1]: sshd@82-139.178.90.101:22-147.75.109.163:60226.service: Deactivated successfully. Feb 9 07:30:04.254662 systemd[1]: session-62.scope: Deactivated successfully. Feb 9 07:30:04.255016 systemd-logind[1462]: Session 62 logged out. Waiting for processes to exit. Feb 9 07:30:04.255371 systemd-logind[1462]: Removed session 62. Feb 9 07:30:04.172000 audit[12111]: CRED_ACQ pid=12111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:04.354149 kernel: audit: type=1101 audit(1707463804.171:2269): pid=12111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:04.354203 kernel: audit: type=1103 audit(1707463804.172:2270): pid=12111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:04.354222 kernel: audit: type=1006 audit(1707463804.172:2271): pid=12111 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=62 res=1 Feb 9 07:30:04.172000 audit[12111]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf4919610 a2=3 a3=0 items=0 ppid=1 pid=12111 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:04.504924 kernel: audit: type=1300 audit(1707463804.172:2271): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf4919610 a2=3 a3=0 items=0 ppid=1 pid=12111 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:04.504956 kernel: audit: type=1327 audit(1707463804.172:2271): proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:04.172000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:04.535454 kernel: audit: type=1105 audit(1707463804.177:2272): pid=12111 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:04.177000 audit[12111]: USER_START pid=12111 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:04.630029 kernel: audit: type=1103 audit(1707463804.177:2273): pid=12113 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:04.177000 audit[12113]: CRED_ACQ pid=12113 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:04.253000 audit[12111]: USER_END pid=12111 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:04.814796 kernel: audit: type=1106 audit(1707463804.253:2274): pid=12111 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:04.814832 kernel: audit: type=1104 audit(1707463804.253:2275): pid=12111 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:04.253000 audit[12111]: CRED_DISP pid=12111 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:04.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.101:22-147.75.109.163:60226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:09.262619 systemd[1]: Started sshd@83-139.178.90.101:22-147.75.109.163:50300.service. Feb 9 07:30:09.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.101:22-147.75.109.163:50300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:09.289763 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:30:09.289870 kernel: audit: type=1130 audit(1707463809.262:2277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.101:22-147.75.109.163:50300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:09.401000 audit[12139]: USER_ACCT pid=12139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:09.401979 sshd[12139]: Accepted publickey for core from 147.75.109.163 port 50300 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:30:09.403908 sshd[12139]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:30:09.406391 systemd-logind[1462]: New session 63 of user core. Feb 9 07:30:09.406876 systemd[1]: Started session-63.scope. Feb 9 07:30:09.485412 sshd[12139]: pam_unix(sshd:session): session closed for user core Feb 9 07:30:09.486842 systemd[1]: sshd@83-139.178.90.101:22-147.75.109.163:50300.service: Deactivated successfully. Feb 9 07:30:09.487285 systemd[1]: session-63.scope: Deactivated successfully. Feb 9 07:30:09.487637 systemd-logind[1462]: Session 63 logged out. Waiting for processes to exit. Feb 9 07:30:09.488082 systemd-logind[1462]: Removed session 63. Feb 9 07:30:09.403000 audit[12139]: CRED_ACQ pid=12139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:09.583942 kernel: audit: type=1101 audit(1707463809.401:2278): pid=12139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:09.583980 kernel: audit: type=1103 audit(1707463809.403:2279): pid=12139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:09.583994 kernel: audit: type=1006 audit(1707463809.403:2280): pid=12139 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=63 res=1 Feb 9 07:30:09.403000 audit[12139]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb67eb2f0 a2=3 a3=0 items=0 ppid=1 pid=12139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:09.734599 kernel: audit: type=1300 audit(1707463809.403:2280): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb67eb2f0 a2=3 a3=0 items=0 ppid=1 pid=12139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:09.734636 kernel: audit: type=1327 audit(1707463809.403:2280): proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:09.403000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:09.765117 kernel: audit: type=1105 audit(1707463809.408:2281): pid=12139 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:09.408000 audit[12139]: USER_START pid=12139 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:09.408000 audit[12141]: CRED_ACQ pid=12141 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:09.948825 kernel: audit: type=1103 audit(1707463809.408:2282): pid=12141 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:09.948861 kernel: audit: type=1106 audit(1707463809.485:2283): pid=12139 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:09.485000 audit[12139]: USER_END pid=12139 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:09.485000 audit[12139]: CRED_DISP pid=12139 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:10.133678 kernel: audit: type=1104 audit(1707463809.485:2284): pid=12139 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:09.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.101:22-147.75.109.163:50300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:14.495246 systemd[1]: Started sshd@84-139.178.90.101:22-147.75.109.163:60510.service. Feb 9 07:30:14.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.101:22-147.75.109.163:60510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:14.522077 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:30:14.522129 kernel: audit: type=1130 audit(1707463814.494:2286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.101:22-147.75.109.163:60510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:14.633100 sshd[12170]: Accepted publickey for core from 147.75.109.163 port 60510 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:30:14.632000 audit[12170]: USER_ACCT pid=12170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:14.633886 sshd[12170]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:30:14.636308 systemd-logind[1462]: New session 64 of user core. Feb 9 07:30:14.636848 systemd[1]: Started session-64.scope. Feb 9 07:30:14.720039 sshd[12170]: pam_unix(sshd:session): session closed for user core Feb 9 07:30:14.721508 systemd[1]: sshd@84-139.178.90.101:22-147.75.109.163:60510.service: Deactivated successfully. Feb 9 07:30:14.721935 systemd[1]: session-64.scope: Deactivated successfully. Feb 9 07:30:14.722339 systemd-logind[1462]: Session 64 logged out. Waiting for processes to exit. Feb 9 07:30:14.722925 systemd-logind[1462]: Removed session 64. Feb 9 07:30:14.633000 audit[12170]: CRED_ACQ pid=12170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:14.815097 kernel: audit: type=1101 audit(1707463814.632:2287): pid=12170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:14.815135 kernel: audit: type=1103 audit(1707463814.633:2288): pid=12170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:14.815157 kernel: audit: type=1006 audit(1707463814.633:2289): pid=12170 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=64 res=1 Feb 9 07:30:14.633000 audit[12170]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe39e8ff30 a2=3 a3=0 items=0 ppid=1 pid=12170 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:14.874593 kernel: audit: type=1300 audit(1707463814.633:2289): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe39e8ff30 a2=3 a3=0 items=0 ppid=1 pid=12170 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:14.633000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:14.996292 kernel: audit: type=1327 audit(1707463814.633:2289): proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:14.996324 kernel: audit: type=1105 audit(1707463814.638:2290): pid=12170 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:14.638000 audit[12170]: USER_START pid=12170 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:14.639000 audit[12172]: CRED_ACQ pid=12172 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:15.180022 kernel: audit: type=1103 audit(1707463814.639:2291): pid=12172 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:15.180084 kernel: audit: type=1106 audit(1707463814.720:2292): pid=12170 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:14.720000 audit[12170]: USER_END pid=12170 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:14.720000 audit[12170]: CRED_DISP pid=12170 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:15.364926 kernel: audit: type=1104 audit(1707463814.720:2293): pid=12170 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:14.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.101:22-147.75.109.163:60510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:15.887000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:30:15.887000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001e13c80 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:30:15.887000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:30:16.075000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:30:16.075000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001c243a0 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:30:16.075000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:30:19.729879 systemd[1]: Started sshd@85-139.178.90.101:22-147.75.109.163:60512.service. Feb 9 07:30:19.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.101:22-147.75.109.163:60512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:19.756649 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 07:30:19.756703 kernel: audit: type=1130 audit(1707463819.729:2297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.101:22-147.75.109.163:60512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:19.779468 sshd[12196]: Accepted publickey for core from 147.75.109.163 port 60512 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:30:19.781237 sshd[12196]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:30:19.783722 systemd-logind[1462]: New session 65 of user core. Feb 9 07:30:19.784394 systemd[1]: Started session-65.scope. Feb 9 07:30:19.778000 audit[12196]: USER_ACCT pid=12196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:19.865599 sshd[12196]: pam_unix(sshd:session): session closed for user core Feb 9 07:30:19.866958 systemd[1]: sshd@85-139.178.90.101:22-147.75.109.163:60512.service: Deactivated successfully. Feb 9 07:30:19.867411 systemd[1]: session-65.scope: Deactivated successfully. Feb 9 07:30:19.867832 systemd-logind[1462]: Session 65 logged out. Waiting for processes to exit. Feb 9 07:30:19.868379 systemd-logind[1462]: Removed session 65. Feb 9 07:30:19.937992 kernel: audit: type=1101 audit(1707463819.778:2298): pid=12196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:19.938046 kernel: audit: type=1103 audit(1707463819.780:2299): pid=12196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:19.780000 audit[12196]: CRED_ACQ pid=12196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:20.087301 kernel: audit: type=1006 audit(1707463819.780:2300): pid=12196 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=65 res=1 Feb 9 07:30:20.087345 kernel: audit: type=1300 audit(1707463819.780:2300): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc27aef5b0 a2=3 a3=0 items=0 ppid=1 pid=12196 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:19.780000 audit[12196]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc27aef5b0 a2=3 a3=0 items=0 ppid=1 pid=12196 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:19.780000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:20.179499 kernel: audit: type=1327 audit(1707463819.780:2300): proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:19.786000 audit[12196]: USER_START pid=12196 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:20.210569 kernel: audit: type=1105 audit(1707463819.786:2301): pid=12196 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:19.787000 audit[12205]: CRED_ACQ pid=12205 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:20.393772 kernel: audit: type=1103 audit(1707463819.787:2302): pid=12205 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:20.393808 kernel: audit: type=1106 audit(1707463819.865:2303): pid=12196 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:19.865000 audit[12196]: USER_END pid=12196 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:20.489352 kernel: audit: type=1104 audit(1707463819.865:2304): pid=12196 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:19.865000 audit[12196]: CRED_DISP pid=12196 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:19.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.101:22-147.75.109.163:60512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:19.896000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:30:19.896000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a519e0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:30:19.896000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:30:19.896000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:30:19.896000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ccd2a0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:30:19.896000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:30:19.945000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:30:19.945000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c013282ea0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:30:19.945000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:30:19.945000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:30:19.945000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c008f49b90 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:30:19.945000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:30:19.946000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:30:19.946000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c01331c810 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:30:19.946000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:30:19.947000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:30:19.947000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c009cf05a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:30:19.947000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:30:19.947000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:30:19.947000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0134048a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:30:19.947000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:30:19.985000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:30:19.985000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c013d11c50 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:30:19.985000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:30:24.038000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:30:24.038000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:30:24.038000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ccd960 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:30:24.038000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc0c60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:30:24.038000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:30:24.038000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:30:24.038000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:30:24.038000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000bc0c80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:30:24.038000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:30:24.039000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:30:24.039000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e0c000 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:30:24.039000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:30:24.875491 systemd[1]: Started sshd@86-139.178.90.101:22-147.75.109.163:58612.service. Feb 9 07:30:24.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.101:22-147.75.109.163:58612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:24.902573 kernel: kauditd_printk_skb: 37 callbacks suppressed Feb 9 07:30:24.902666 kernel: audit: type=1130 audit(1707463824.875:2318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.101:22-147.75.109.163:58612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:24.925448 sshd[12284]: Accepted publickey for core from 147.75.109.163 port 58612 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:30:24.926823 sshd[12284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:30:24.929415 systemd-logind[1462]: New session 66 of user core. Feb 9 07:30:24.930054 systemd[1]: Started session-66.scope. Feb 9 07:30:24.924000 audit[12284]: USER_ACCT pid=12284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:25.010869 sshd[12284]: pam_unix(sshd:session): session closed for user core Feb 9 07:30:25.012199 systemd[1]: sshd@86-139.178.90.101:22-147.75.109.163:58612.service: Deactivated successfully. Feb 9 07:30:25.012646 systemd[1]: session-66.scope: Deactivated successfully. Feb 9 07:30:25.013032 systemd-logind[1462]: Session 66 logged out. Waiting for processes to exit. Feb 9 07:30:25.013437 systemd-logind[1462]: Removed session 66. Feb 9 07:30:25.083226 kernel: audit: type=1101 audit(1707463824.924:2319): pid=12284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:25.083261 kernel: audit: type=1103 audit(1707463824.926:2320): pid=12284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:24.926000 audit[12284]: CRED_ACQ pid=12284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:25.173874 kernel: audit: type=1006 audit(1707463824.926:2321): pid=12284 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=66 res=1 Feb 9 07:30:25.232538 kernel: audit: type=1300 audit(1707463824.926:2321): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb62b0e10 a2=3 a3=0 items=0 ppid=1 pid=12284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:24.926000 audit[12284]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb62b0e10 a2=3 a3=0 items=0 ppid=1 pid=12284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:24.926000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:25.355208 kernel: audit: type=1327 audit(1707463824.926:2321): proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:25.355238 kernel: audit: type=1105 audit(1707463824.932:2322): pid=12284 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:24.932000 audit[12284]: USER_START pid=12284 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:25.449731 kernel: audit: type=1103 audit(1707463824.933:2323): pid=12286 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:24.933000 audit[12286]: CRED_ACQ pid=12286 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:25.539006 kernel: audit: type=1106 audit(1707463825.010:2324): pid=12284 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:25.010000 audit[12284]: USER_END pid=12284 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:25.634622 kernel: audit: type=1104 audit(1707463825.010:2325): pid=12284 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:25.010000 audit[12284]: CRED_DISP pid=12284 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:25.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.101:22-147.75.109.163:58612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:30.020465 systemd[1]: Started sshd@87-139.178.90.101:22-147.75.109.163:58628.service. Feb 9 07:30:30.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.101:22-147.75.109.163:58628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:30.047487 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:30:30.047722 kernel: audit: type=1130 audit(1707463830.020:2327): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.101:22-147.75.109.163:58628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:30.070598 sshd[12310]: Accepted publickey for core from 147.75.109.163 port 58628 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:30:30.071940 sshd[12310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:30:30.074310 systemd-logind[1462]: New session 67 of user core. Feb 9 07:30:30.075032 systemd[1]: Started session-67.scope. Feb 9 07:30:30.070000 audit[12310]: USER_ACCT pid=12310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:30.157581 sshd[12310]: pam_unix(sshd:session): session closed for user core Feb 9 07:30:30.159101 systemd[1]: sshd@87-139.178.90.101:22-147.75.109.163:58628.service: Deactivated successfully. Feb 9 07:30:30.159553 systemd[1]: session-67.scope: Deactivated successfully. Feb 9 07:30:30.159981 systemd-logind[1462]: Session 67 logged out. Waiting for processes to exit. Feb 9 07:30:30.160478 systemd-logind[1462]: Removed session 67. Feb 9 07:30:30.229474 kernel: audit: type=1101 audit(1707463830.070:2328): pid=12310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:30.071000 audit[12310]: CRED_ACQ pid=12310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:30.378915 kernel: audit: type=1103 audit(1707463830.071:2329): pid=12310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:30.379001 kernel: audit: type=1006 audit(1707463830.071:2330): pid=12310 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=67 res=1 Feb 9 07:30:30.379021 kernel: audit: type=1300 audit(1707463830.071:2330): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd70596880 a2=3 a3=0 items=0 ppid=1 pid=12310 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:30.071000 audit[12310]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd70596880 a2=3 a3=0 items=0 ppid=1 pid=12310 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:30.470995 kernel: audit: type=1327 audit(1707463830.071:2330): proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:30.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:30.501501 kernel: audit: type=1105 audit(1707463830.077:2331): pid=12310 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:30.077000 audit[12310]: USER_START pid=12310 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:30.596068 kernel: audit: type=1103 audit(1707463830.078:2332): pid=12312 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:30.078000 audit[12312]: CRED_ACQ pid=12312 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:30.685389 kernel: audit: type=1106 audit(1707463830.157:2333): pid=12310 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:30.157000 audit[12310]: USER_END pid=12310 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:30.157000 audit[12310]: CRED_DISP pid=12310 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:30.870372 kernel: audit: type=1104 audit(1707463830.157:2334): pid=12310 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:30.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.101:22-147.75.109.163:58628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:35.169944 systemd[1]: Started sshd@88-139.178.90.101:22-147.75.109.163:41456.service. Feb 9 07:30:35.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.101:22-147.75.109.163:41456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:35.197499 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:30:35.197566 kernel: audit: type=1130 audit(1707463835.169:2336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.101:22-147.75.109.163:41456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:35.309561 sshd[12375]: Accepted publickey for core from 147.75.109.163 port 41456 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:30:35.308000 audit[12375]: USER_ACCT pid=12375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:35.311015 sshd[12375]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:30:35.313508 systemd-logind[1462]: New session 68 of user core. Feb 9 07:30:35.314115 systemd[1]: Started session-68.scope. Feb 9 07:30:35.393223 sshd[12375]: pam_unix(sshd:session): session closed for user core Feb 9 07:30:35.394577 systemd[1]: sshd@88-139.178.90.101:22-147.75.109.163:41456.service: Deactivated successfully. Feb 9 07:30:35.395034 systemd[1]: session-68.scope: Deactivated successfully. Feb 9 07:30:35.395353 systemd-logind[1462]: Session 68 logged out. Waiting for processes to exit. Feb 9 07:30:35.395988 systemd-logind[1462]: Removed session 68. Feb 9 07:30:35.310000 audit[12375]: CRED_ACQ pid=12375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:35.491717 kernel: audit: type=1101 audit(1707463835.308:2337): pid=12375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:35.491771 kernel: audit: type=1103 audit(1707463835.310:2338): pid=12375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:35.491790 kernel: audit: type=1006 audit(1707463835.310:2339): pid=12375 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=68 res=1 Feb 9 07:30:35.550430 kernel: audit: type=1300 audit(1707463835.310:2339): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbd543560 a2=3 a3=0 items=0 ppid=1 pid=12375 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:35.310000 audit[12375]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbd543560 a2=3 a3=0 items=0 ppid=1 pid=12375 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:35.642537 kernel: audit: type=1327 audit(1707463835.310:2339): proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:35.310000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:35.673061 kernel: audit: type=1105 audit(1707463835.315:2340): pid=12375 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:35.315000 audit[12375]: USER_START pid=12375 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:35.767663 kernel: audit: type=1103 audit(1707463835.316:2341): pid=12377 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:35.316000 audit[12377]: CRED_ACQ pid=12377 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:35.393000 audit[12375]: USER_END pid=12375 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:35.952799 kernel: audit: type=1106 audit(1707463835.393:2342): pid=12375 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:35.952833 kernel: audit: type=1104 audit(1707463835.393:2343): pid=12375 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:35.393000 audit[12375]: CRED_DISP pid=12375 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:35.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.101:22-147.75.109.163:41456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:40.405191 systemd[1]: Started sshd@89-139.178.90.101:22-147.75.109.163:41466.service. Feb 9 07:30:40.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.101:22-147.75.109.163:41466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:40.432552 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:30:40.432606 kernel: audit: type=1130 audit(1707463840.405:2345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.101:22-147.75.109.163:41466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:40.545000 audit[12403]: USER_ACCT pid=12403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:40.546193 sshd[12403]: Accepted publickey for core from 147.75.109.163 port 41466 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:30:40.549237 sshd[12403]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:30:40.555153 systemd-logind[1462]: New session 69 of user core. Feb 9 07:30:40.556469 systemd[1]: Started session-69.scope. Feb 9 07:30:40.548000 audit[12403]: CRED_ACQ pid=12403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:40.639482 sshd[12403]: pam_unix(sshd:session): session closed for user core Feb 9 07:30:40.640980 systemd[1]: sshd@89-139.178.90.101:22-147.75.109.163:41466.service: Deactivated successfully. Feb 9 07:30:40.641425 systemd[1]: session-69.scope: Deactivated successfully. Feb 9 07:30:40.641837 systemd-logind[1462]: Session 69 logged out. Waiting for processes to exit. Feb 9 07:30:40.642379 systemd-logind[1462]: Removed session 69. Feb 9 07:30:40.728201 kernel: audit: type=1101 audit(1707463840.545:2346): pid=12403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:40.728242 kernel: audit: type=1103 audit(1707463840.548:2347): pid=12403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:40.728258 kernel: audit: type=1006 audit(1707463840.548:2348): pid=12403 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=69 res=1 Feb 9 07:30:40.787000 kernel: audit: type=1300 audit(1707463840.548:2348): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd91fbd570 a2=3 a3=0 items=0 ppid=1 pid=12403 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:40.548000 audit[12403]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd91fbd570 a2=3 a3=0 items=0 ppid=1 pid=12403 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:40.879212 kernel: audit: type=1327 audit(1707463840.548:2348): proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:40.548000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:40.561000 audit[12403]: USER_START pid=12403 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:41.004382 kernel: audit: type=1105 audit(1707463840.561:2349): pid=12403 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:41.004414 kernel: audit: type=1103 audit(1707463840.562:2350): pid=12405 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:40.562000 audit[12405]: CRED_ACQ pid=12405 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:40.639000 audit[12403]: USER_END pid=12403 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:41.094557 kernel: audit: type=1106 audit(1707463840.639:2351): pid=12403 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:40.639000 audit[12403]: CRED_DISP pid=12403 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:41.280193 kernel: audit: type=1104 audit(1707463840.639:2352): pid=12403 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:40.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.101:22-147.75.109.163:41466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:45.647407 systemd[1]: Started sshd@90-139.178.90.101:22-147.75.109.163:36356.service. Feb 9 07:30:45.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.101:22-147.75.109.163:36356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:45.674513 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:30:45.674594 kernel: audit: type=1130 audit(1707463845.647:2354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.101:22-147.75.109.163:36356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:45.786000 audit[12429]: USER_ACCT pid=12429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:45.787027 sshd[12429]: Accepted publickey for core from 147.75.109.163 port 36356 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:30:45.788818 sshd[12429]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:30:45.791544 systemd-logind[1462]: New session 70 of user core. Feb 9 07:30:45.792176 systemd[1]: Started session-70.scope. Feb 9 07:30:45.872717 sshd[12429]: pam_unix(sshd:session): session closed for user core Feb 9 07:30:45.874202 systemd[1]: sshd@90-139.178.90.101:22-147.75.109.163:36356.service: Deactivated successfully. Feb 9 07:30:45.874663 systemd[1]: session-70.scope: Deactivated successfully. Feb 9 07:30:45.875038 systemd-logind[1462]: Session 70 logged out. Waiting for processes to exit. Feb 9 07:30:45.875449 systemd-logind[1462]: Removed session 70. Feb 9 07:30:45.788000 audit[12429]: CRED_ACQ pid=12429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:45.970322 kernel: audit: type=1101 audit(1707463845.786:2355): pid=12429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:45.970361 kernel: audit: type=1103 audit(1707463845.788:2356): pid=12429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:45.970381 kernel: audit: type=1006 audit(1707463845.788:2357): pid=12429 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=70 res=1 Feb 9 07:30:46.028988 kernel: audit: type=1300 audit(1707463845.788:2357): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd59be2c10 a2=3 a3=0 items=0 ppid=1 pid=12429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:45.788000 audit[12429]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd59be2c10 a2=3 a3=0 items=0 ppid=1 pid=12429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:45.788000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:46.151679 kernel: audit: type=1327 audit(1707463845.788:2357): proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:46.151711 kernel: audit: type=1105 audit(1707463845.794:2358): pid=12429 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:45.794000 audit[12429]: USER_START pid=12429 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:46.246255 kernel: audit: type=1103 audit(1707463845.794:2359): pid=12431 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:45.794000 audit[12431]: CRED_ACQ pid=12431 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:46.335552 kernel: audit: type=1106 audit(1707463845.872:2360): pid=12429 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:45.872000 audit[12429]: USER_END pid=12429 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:46.431155 kernel: audit: type=1104 audit(1707463845.873:2361): pid=12429 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:45.873000 audit[12429]: CRED_DISP pid=12429 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:45.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.101:22-147.75.109.163:36356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:50.882525 systemd[1]: Started sshd@91-139.178.90.101:22-147.75.109.163:36372.service. Feb 9 07:30:50.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.101:22-147.75.109.163:36372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:50.909531 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:30:50.909621 kernel: audit: type=1130 audit(1707463850.881:2363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.101:22-147.75.109.163:36372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:51.019000 audit[12482]: USER_ACCT pid=12482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:51.021072 sshd[12482]: Accepted publickey for core from 147.75.109.163 port 36372 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:30:51.021785 sshd[12482]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:30:51.024444 systemd-logind[1462]: New session 71 of user core. Feb 9 07:30:51.024976 systemd[1]: Started session-71.scope. Feb 9 07:30:51.106589 sshd[12482]: pam_unix(sshd:session): session closed for user core Feb 9 07:30:51.108108 systemd[1]: sshd@91-139.178.90.101:22-147.75.109.163:36372.service: Deactivated successfully. Feb 9 07:30:51.108671 systemd[1]: session-71.scope: Deactivated successfully. Feb 9 07:30:51.109099 systemd-logind[1462]: Session 71 logged out. Waiting for processes to exit. Feb 9 07:30:51.109488 systemd-logind[1462]: Removed session 71. Feb 9 07:30:51.020000 audit[12482]: CRED_ACQ pid=12482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:51.205581 kernel: audit: type=1101 audit(1707463851.019:2364): pid=12482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:51.205619 kernel: audit: type=1103 audit(1707463851.020:2365): pid=12482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:51.205639 kernel: audit: type=1006 audit(1707463851.020:2366): pid=12482 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=71 res=1 Feb 9 07:30:51.020000 audit[12482]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5e97c2e0 a2=3 a3=0 items=0 ppid=1 pid=12482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:51.356366 kernel: audit: type=1300 audit(1707463851.020:2366): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5e97c2e0 a2=3 a3=0 items=0 ppid=1 pid=12482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:51.356414 kernel: audit: type=1327 audit(1707463851.020:2366): proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:51.020000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:51.386885 kernel: audit: type=1105 audit(1707463851.025:2367): pid=12482 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:51.025000 audit[12482]: USER_START pid=12482 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:51.026000 audit[12484]: CRED_ACQ pid=12484 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:51.570787 kernel: audit: type=1103 audit(1707463851.026:2368): pid=12484 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:51.570822 kernel: audit: type=1106 audit(1707463851.105:2369): pid=12482 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:51.105000 audit[12482]: USER_END pid=12482 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:51.666349 kernel: audit: type=1104 audit(1707463851.105:2370): pid=12482 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:51.105000 audit[12482]: CRED_DISP pid=12482 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:51.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.101:22-147.75.109.163:36372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:56.119392 systemd[1]: Started sshd@92-139.178.90.101:22-147.75.109.163:53662.service. Feb 9 07:30:56.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.101:22-147.75.109.163:53662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:56.146775 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:30:56.146858 kernel: audit: type=1130 audit(1707463856.118:2372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.101:22-147.75.109.163:53662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:56.257000 audit[12559]: USER_ACCT pid=12559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:56.259582 sshd[12559]: Accepted publickey for core from 147.75.109.163 port 53662 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:30:56.260827 sshd[12559]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:30:56.263295 systemd-logind[1462]: New session 72 of user core. Feb 9 07:30:56.263872 systemd[1]: Started session-72.scope. Feb 9 07:30:56.344500 sshd[12559]: pam_unix(sshd:session): session closed for user core Feb 9 07:30:56.346040 systemd[1]: sshd@92-139.178.90.101:22-147.75.109.163:53662.service: Deactivated successfully. Feb 9 07:30:56.346676 systemd[1]: session-72.scope: Deactivated successfully. Feb 9 07:30:56.347090 systemd-logind[1462]: Session 72 logged out. Waiting for processes to exit. Feb 9 07:30:56.347501 systemd-logind[1462]: Removed session 72. Feb 9 07:30:56.259000 audit[12559]: CRED_ACQ pid=12559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:56.443703 kernel: audit: type=1101 audit(1707463856.257:2373): pid=12559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:56.443742 kernel: audit: type=1103 audit(1707463856.259:2374): pid=12559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:56.443760 kernel: audit: type=1006 audit(1707463856.259:2375): pid=12559 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=72 res=1 Feb 9 07:30:56.502388 kernel: audit: type=1300 audit(1707463856.259:2375): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8c844200 a2=3 a3=0 items=0 ppid=1 pid=12559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:56.259000 audit[12559]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8c844200 a2=3 a3=0 items=0 ppid=1 pid=12559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:30:56.594524 kernel: audit: type=1327 audit(1707463856.259:2375): proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:56.259000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:30:56.264000 audit[12559]: USER_START pid=12559 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:56.719579 kernel: audit: type=1105 audit(1707463856.264:2376): pid=12559 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:56.719614 kernel: audit: type=1103 audit(1707463856.265:2377): pid=12561 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:56.265000 audit[12561]: CRED_ACQ pid=12561 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:56.808830 kernel: audit: type=1106 audit(1707463856.343:2378): pid=12559 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:56.343000 audit[12559]: USER_END pid=12559 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:56.904470 kernel: audit: type=1104 audit(1707463856.343:2379): pid=12559 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:56.343000 audit[12559]: CRED_DISP pid=12559 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:30:56.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.101:22-147.75.109.163:53662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:01.356147 systemd[1]: Started sshd@93-139.178.90.101:22-147.75.109.163:53666.service. Feb 9 07:31:01.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.101:22-147.75.109.163:53666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:01.383479 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:31:01.383567 kernel: audit: type=1130 audit(1707463861.355:2381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.101:22-147.75.109.163:53666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:01.494000 audit[12587]: USER_ACCT pid=12587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:01.496006 sshd[12587]: Accepted publickey for core from 147.75.109.163 port 53666 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:01.496785 sshd[12587]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:01.499209 systemd-logind[1462]: New session 73 of user core. Feb 9 07:31:01.499862 systemd[1]: Started session-73.scope. Feb 9 07:31:01.580070 sshd[12587]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:01.581382 systemd[1]: sshd@93-139.178.90.101:22-147.75.109.163:53666.service: Deactivated successfully. Feb 9 07:31:01.581814 systemd[1]: session-73.scope: Deactivated successfully. Feb 9 07:31:01.582155 systemd-logind[1462]: Session 73 logged out. Waiting for processes to exit. Feb 9 07:31:01.582543 systemd-logind[1462]: Removed session 73. Feb 9 07:31:01.495000 audit[12587]: CRED_ACQ pid=12587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:01.677903 kernel: audit: type=1101 audit(1707463861.494:2382): pid=12587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:01.677952 kernel: audit: type=1103 audit(1707463861.495:2383): pid=12587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:01.677970 kernel: audit: type=1006 audit(1707463861.495:2384): pid=12587 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=73 res=1 Feb 9 07:31:01.736578 kernel: audit: type=1300 audit(1707463861.495:2384): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbbfba3a0 a2=3 a3=0 items=0 ppid=1 pid=12587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:01.495000 audit[12587]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbbfba3a0 a2=3 a3=0 items=0 ppid=1 pid=12587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:01.828573 kernel: audit: type=1327 audit(1707463861.495:2384): proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:01.495000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:01.859064 kernel: audit: type=1105 audit(1707463861.500:2385): pid=12587 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:01.500000 audit[12587]: USER_START pid=12587 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:01.953597 kernel: audit: type=1103 audit(1707463861.501:2386): pid=12591 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:01.501000 audit[12591]: CRED_ACQ pid=12591 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:01.579000 audit[12587]: USER_END pid=12587 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:02.138413 kernel: audit: type=1106 audit(1707463861.579:2387): pid=12587 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:02.138443 kernel: audit: type=1104 audit(1707463861.579:2388): pid=12587 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:01.579000 audit[12587]: CRED_DISP pid=12587 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:01.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.101:22-147.75.109.163:53666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:02.865577 systemd[1]: Started sshd@94-139.178.90.101:22-74.121.149.150:55466.service. Feb 9 07:31:02.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.101:22-74.121.149.150:55466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:06.464229 sshd[12613]: Invalid user james from 74.121.149.150 port 55466 Feb 9 07:31:06.470383 sshd[12613]: pam_faillock(sshd:auth): User unknown Feb 9 07:31:06.471394 sshd[12613]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:31:06.471484 sshd[12613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.121.149.150 Feb 9 07:31:06.472442 sshd[12613]: pam_faillock(sshd:auth): User unknown Feb 9 07:31:06.471000 audit[12613]: USER_AUTH pid=12613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="james" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:31:06.510482 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:31:06.510555 kernel: audit: type=1100 audit(1707463866.471:2391): pid=12613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="james" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:31:06.582966 systemd[1]: Started sshd@95-139.178.90.101:22-147.75.109.163:36938.service. Feb 9 07:31:06.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.101:22-147.75.109.163:36938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:06.688443 kernel: audit: type=1130 audit(1707463866.581:2392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.101:22-147.75.109.163:36938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:06.709000 audit[12634]: USER_ACCT pid=12634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:06.711449 sshd[12634]: Accepted publickey for core from 147.75.109.163 port 36938 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:06.712696 sshd[12634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:06.715888 systemd-logind[1462]: New session 74 of user core. Feb 9 07:31:06.716532 systemd[1]: Started session-74.scope. Feb 9 07:31:06.797295 sshd[12634]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:06.798726 systemd[1]: sshd@95-139.178.90.101:22-147.75.109.163:36938.service: Deactivated successfully. Feb 9 07:31:06.799181 systemd[1]: session-74.scope: Deactivated successfully. Feb 9 07:31:06.799474 systemd-logind[1462]: Session 74 logged out. Waiting for processes to exit. Feb 9 07:31:06.799944 systemd-logind[1462]: Removed session 74. Feb 9 07:31:06.711000 audit[12634]: CRED_ACQ pid=12634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:06.893913 kernel: audit: type=1101 audit(1707463866.709:2393): pid=12634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:06.893949 kernel: audit: type=1103 audit(1707463866.711:2394): pid=12634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:06.893965 kernel: audit: type=1006 audit(1707463866.711:2395): pid=12634 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=74 res=1 Feb 9 07:31:06.952495 kernel: audit: type=1300 audit(1707463866.711:2395): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe184b870 a2=3 a3=0 items=0 ppid=1 pid=12634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:06.711000 audit[12634]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe184b870 a2=3 a3=0 items=0 ppid=1 pid=12634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:07.044396 kernel: audit: type=1327 audit(1707463866.711:2395): proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:06.711000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:07.074874 kernel: audit: type=1105 audit(1707463866.717:2396): pid=12634 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:06.717000 audit[12634]: USER_START pid=12634 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:07.170257 kernel: audit: type=1103 audit(1707463866.718:2397): pid=12636 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:06.718000 audit[12636]: CRED_ACQ pid=12636 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:07.259502 kernel: audit: type=1106 audit(1707463866.796:2398): pid=12634 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:06.796000 audit[12634]: USER_END pid=12634 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:06.796000 audit[12634]: CRED_DISP pid=12634 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:06.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.101:22-147.75.109.163:36938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:08.937761 sshd[12613]: Failed password for invalid user james from 74.121.149.150 port 55466 ssh2 Feb 9 07:31:10.460980 sshd[12613]: Received disconnect from 74.121.149.150 port 55466:11: Bye Bye [preauth] Feb 9 07:31:10.460980 sshd[12613]: Disconnected from invalid user james 74.121.149.150 port 55466 [preauth] Feb 9 07:31:10.463574 systemd[1]: sshd@94-139.178.90.101:22-74.121.149.150:55466.service: Deactivated successfully. Feb 9 07:31:10.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.101:22-74.121.149.150:55466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:11.807340 systemd[1]: Started sshd@96-139.178.90.101:22-147.75.109.163:36944.service. Feb 9 07:31:11.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.101:22-147.75.109.163:36944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:11.834430 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 07:31:11.834470 kernel: audit: type=1130 audit(1707463871.805:2402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.101:22-147.75.109.163:36944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:11.946000 audit[12663]: USER_ACCT pid=12663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:11.947852 sshd[12663]: Accepted publickey for core from 147.75.109.163 port 36944 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:11.948777 sshd[12663]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:11.951219 systemd-logind[1462]: New session 75 of user core. Feb 9 07:31:11.951886 systemd[1]: Started session-75.scope. Feb 9 07:31:12.031880 sshd[12663]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:12.033265 systemd[1]: sshd@96-139.178.90.101:22-147.75.109.163:36944.service: Deactivated successfully. Feb 9 07:31:12.033752 systemd[1]: session-75.scope: Deactivated successfully. Feb 9 07:31:12.034167 systemd-logind[1462]: Session 75 logged out. Waiting for processes to exit. Feb 9 07:31:12.034673 systemd-logind[1462]: Removed session 75. Feb 9 07:31:11.947000 audit[12663]: CRED_ACQ pid=12663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:12.132487 kernel: audit: type=1101 audit(1707463871.946:2403): pid=12663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:12.132530 kernel: audit: type=1103 audit(1707463871.947:2404): pid=12663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:12.132549 kernel: audit: type=1006 audit(1707463871.947:2405): pid=12663 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=75 res=1 Feb 9 07:31:12.191408 kernel: audit: type=1300 audit(1707463871.947:2405): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc891e96b0 a2=3 a3=0 items=0 ppid=1 pid=12663 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:11.947000 audit[12663]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc891e96b0 a2=3 a3=0 items=0 ppid=1 pid=12663 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:11.947000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:12.314513 kernel: audit: type=1327 audit(1707463871.947:2405): proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:12.314555 kernel: audit: type=1105 audit(1707463871.952:2406): pid=12663 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:11.952000 audit[12663]: USER_START pid=12663 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:11.953000 audit[12665]: CRED_ACQ pid=12665 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:12.499129 kernel: audit: type=1103 audit(1707463871.953:2407): pid=12665 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:12.499168 kernel: audit: type=1106 audit(1707463872.031:2408): pid=12663 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:12.031000 audit[12663]: USER_END pid=12663 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:12.595213 kernel: audit: type=1104 audit(1707463872.031:2409): pid=12663 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:12.031000 audit[12663]: CRED_DISP pid=12663 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:12.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.101:22-147.75.109.163:36944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:15.887000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:31:15.887000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001fffee0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:31:15.887000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:31:16.075000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:31:16.075000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001c52ec0 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:31:16.075000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:31:17.043487 systemd[1]: Started sshd@97-139.178.90.101:22-147.75.109.163:48748.service. Feb 9 07:31:17.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.101:22-147.75.109.163:48748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:17.086474 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 07:31:17.086567 kernel: audit: type=1130 audit(1707463877.042:2413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.101:22-147.75.109.163:48748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:17.197000 audit[12689]: USER_ACCT pid=12689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:17.199064 sshd[12689]: Accepted publickey for core from 147.75.109.163 port 48748 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:17.200175 sshd[12689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:17.202681 systemd-logind[1462]: New session 76 of user core. Feb 9 07:31:17.203173 systemd[1]: Started session-76.scope. Feb 9 07:31:17.198000 audit[12689]: CRED_ACQ pid=12689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:17.292093 sshd[12689]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:17.293348 systemd[1]: sshd@97-139.178.90.101:22-147.75.109.163:48748.service: Deactivated successfully. Feb 9 07:31:17.293790 systemd[1]: session-76.scope: Deactivated successfully. Feb 9 07:31:17.294211 systemd-logind[1462]: Session 76 logged out. Waiting for processes to exit. Feb 9 07:31:17.294672 systemd-logind[1462]: Removed session 76. Feb 9 07:31:17.381277 kernel: audit: type=1101 audit(1707463877.197:2414): pid=12689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:17.381319 kernel: audit: type=1103 audit(1707463877.198:2415): pid=12689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:17.381339 kernel: audit: type=1006 audit(1707463877.198:2416): pid=12689 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=76 res=1 Feb 9 07:31:17.198000 audit[12689]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebde2d730 a2=3 a3=0 items=0 ppid=1 pid=12689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:17.532891 kernel: audit: type=1300 audit(1707463877.198:2416): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebde2d730 a2=3 a3=0 items=0 ppid=1 pid=12689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:17.532932 kernel: audit: type=1327 audit(1707463877.198:2416): proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:17.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:17.563578 kernel: audit: type=1105 audit(1707463877.203:2417): pid=12689 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:17.203000 audit[12689]: USER_START pid=12689 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:17.658751 kernel: audit: type=1103 audit(1707463877.204:2418): pid=12691 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:17.204000 audit[12691]: CRED_ACQ pid=12691 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:17.748051 kernel: audit: type=1106 audit(1707463877.291:2419): pid=12689 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:17.291000 audit[12689]: USER_END pid=12689 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:17.843681 kernel: audit: type=1104 audit(1707463877.291:2420): pid=12689 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:17.291000 audit[12689]: CRED_DISP pid=12689 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:17.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.101:22-147.75.109.163:48748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:19.896000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:31:19.896000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012e1680 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:31:19.896000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:31:19.896000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:31:19.896000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00195d500 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:31:19.896000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:31:19.945000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:31:19.945000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c009f0a700 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:31:19.945000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:31:19.945000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:31:19.945000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c014768690 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:31:19.945000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:31:19.946000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:31:19.946000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c014768720 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:31:19.946000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:31:19.947000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:31:19.947000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c014c1b8c0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:31:19.947000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:31:19.947000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:31:19.947000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0144f0000 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:31:19.947000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:31:19.985000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:31:19.985000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c008f48f30 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:31:19.985000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:31:22.301474 systemd[1]: Started sshd@98-139.178.90.101:22-147.75.109.163:48752.service. Feb 9 07:31:22.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.101:22-147.75.109.163:48752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:22.328774 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 07:31:22.328834 kernel: audit: type=1130 audit(1707463882.300:2430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.101:22-147.75.109.163:48752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:22.351498 sshd[12741]: Accepted publickey for core from 147.75.109.163 port 48752 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:22.352819 sshd[12741]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:22.355683 systemd-logind[1462]: New session 77 of user core. Feb 9 07:31:22.356227 systemd[1]: Started session-77.scope. Feb 9 07:31:22.349000 audit[12741]: USER_ACCT pid=12741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:22.437317 sshd[12741]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:22.438749 systemd[1]: sshd@98-139.178.90.101:22-147.75.109.163:48752.service: Deactivated successfully. Feb 9 07:31:22.439194 systemd[1]: session-77.scope: Deactivated successfully. Feb 9 07:31:22.439473 systemd-logind[1462]: Session 77 logged out. Waiting for processes to exit. Feb 9 07:31:22.439976 systemd-logind[1462]: Removed session 77. Feb 9 07:31:22.510786 kernel: audit: type=1101 audit(1707463882.349:2431): pid=12741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:22.510818 kernel: audit: type=1103 audit(1707463882.351:2432): pid=12741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:22.351000 audit[12741]: CRED_ACQ pid=12741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:22.601581 kernel: audit: type=1006 audit(1707463882.351:2433): pid=12741 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=77 res=1 Feb 9 07:31:22.660293 kernel: audit: type=1300 audit(1707463882.351:2433): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4110cdf0 a2=3 a3=0 items=0 ppid=1 pid=12741 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:22.351000 audit[12741]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4110cdf0 a2=3 a3=0 items=0 ppid=1 pid=12741 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:22.752417 kernel: audit: type=1327 audit(1707463882.351:2433): proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:22.351000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:22.782939 kernel: audit: type=1105 audit(1707463882.356:2434): pid=12741 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:22.356000 audit[12741]: USER_START pid=12741 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:22.877504 kernel: audit: type=1103 audit(1707463882.357:2435): pid=12743 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:22.357000 audit[12743]: CRED_ACQ pid=12743 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:22.436000 audit[12741]: USER_END pid=12741 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:23.062455 kernel: audit: type=1106 audit(1707463882.436:2436): pid=12741 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:23.062490 kernel: audit: type=1104 audit(1707463882.436:2437): pid=12741 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:22.436000 audit[12741]: CRED_DISP pid=12741 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:22.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.101:22-147.75.109.163:48752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:24.038000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:31:24.038000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001042260 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:31:24.038000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:31:24.038000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:31:24.038000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007d1b20 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:31:24.038000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:31:24.038000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:31:24.038000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012e1780 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:31:24.038000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:31:24.038000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:31:24.038000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e0c600 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:31:24.038000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:31:27.446982 systemd[1]: Started sshd@99-139.178.90.101:22-147.75.109.163:49202.service. Feb 9 07:31:27.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.101:22-147.75.109.163:49202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:27.474838 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 07:31:27.474900 kernel: audit: type=1130 audit(1707463887.445:2443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.101:22-147.75.109.163:49202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:27.587000 audit[12805]: USER_ACCT pid=12805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:27.589813 sshd[12805]: Accepted publickey for core from 147.75.109.163 port 49202 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:27.593907 sshd[12805]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:27.602024 systemd-logind[1462]: New session 78 of user core. Feb 9 07:31:27.603874 systemd[1]: Started session-78.scope. Feb 9 07:31:27.591000 audit[12805]: CRED_ACQ pid=12805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:27.681557 kernel: audit: type=1101 audit(1707463887.587:2444): pid=12805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:27.681591 kernel: audit: type=1103 audit(1707463887.591:2445): pid=12805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:27.687522 sshd[12805]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:27.689029 systemd[1]: sshd@99-139.178.90.101:22-147.75.109.163:49202.service: Deactivated successfully. Feb 9 07:31:27.689468 systemd[1]: session-78.scope: Deactivated successfully. Feb 9 07:31:27.689890 systemd-logind[1462]: Session 78 logged out. Waiting for processes to exit. Feb 9 07:31:27.690374 systemd-logind[1462]: Removed session 78. Feb 9 07:31:27.830146 kernel: audit: type=1006 audit(1707463887.591:2446): pid=12805 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=78 res=1 Feb 9 07:31:27.830185 kernel: audit: type=1300 audit(1707463887.591:2446): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd321f3a0 a2=3 a3=0 items=0 ppid=1 pid=12805 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:27.591000 audit[12805]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd321f3a0 a2=3 a3=0 items=0 ppid=1 pid=12805 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:27.922159 kernel: audit: type=1327 audit(1707463887.591:2446): proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:27.591000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:27.608000 audit[12805]: USER_START pid=12805 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:28.047197 kernel: audit: type=1105 audit(1707463887.608:2447): pid=12805 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:28.047228 kernel: audit: type=1103 audit(1707463887.609:2448): pid=12807 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:27.609000 audit[12807]: CRED_ACQ pid=12807 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:27.686000 audit[12805]: USER_END pid=12805 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:28.232062 kernel: audit: type=1106 audit(1707463887.686:2449): pid=12805 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:28.232098 kernel: audit: type=1104 audit(1707463887.686:2450): pid=12805 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:27.686000 audit[12805]: CRED_DISP pid=12805 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:27.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.101:22-147.75.109.163:49202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:32.697614 systemd[1]: Started sshd@100-139.178.90.101:22-147.75.109.163:49204.service. Feb 9 07:31:32.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.101:22-147.75.109.163:49204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:32.724641 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:31:32.724734 kernel: audit: type=1130 audit(1707463892.696:2452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.101:22-147.75.109.163:49204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:32.834000 audit[12832]: USER_ACCT pid=12832 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:32.836080 sshd[12832]: Accepted publickey for core from 147.75.109.163 port 49204 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:32.837819 sshd[12832]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:32.840148 systemd-logind[1462]: New session 79 of user core. Feb 9 07:31:32.840856 systemd[1]: Started session-79.scope. Feb 9 07:31:32.920824 sshd[12832]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:32.922230 systemd[1]: sshd@100-139.178.90.101:22-147.75.109.163:49204.service: Deactivated successfully. Feb 9 07:31:32.922678 systemd[1]: session-79.scope: Deactivated successfully. Feb 9 07:31:32.923044 systemd-logind[1462]: Session 79 logged out. Waiting for processes to exit. Feb 9 07:31:32.923448 systemd-logind[1462]: Removed session 79. Feb 9 07:31:32.836000 audit[12832]: CRED_ACQ pid=12832 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:33.018188 kernel: audit: type=1101 audit(1707463892.834:2453): pid=12832 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:33.018234 kernel: audit: type=1103 audit(1707463892.836:2454): pid=12832 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:33.018254 kernel: audit: type=1006 audit(1707463892.836:2455): pid=12832 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=79 res=1 Feb 9 07:31:33.076918 kernel: audit: type=1300 audit(1707463892.836:2455): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9dbaced0 a2=3 a3=0 items=0 ppid=1 pid=12832 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:32.836000 audit[12832]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9dbaced0 a2=3 a3=0 items=0 ppid=1 pid=12832 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:33.169135 kernel: audit: type=1327 audit(1707463892.836:2455): proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:32.836000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:32.841000 audit[12832]: USER_START pid=12832 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:33.200583 kernel: audit: type=1105 audit(1707463892.841:2456): pid=12832 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:32.842000 audit[12834]: CRED_ACQ pid=12834 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:33.294592 kernel: audit: type=1103 audit(1707463892.842:2457): pid=12834 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:32.920000 audit[12832]: USER_END pid=12832 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:33.479335 kernel: audit: type=1106 audit(1707463892.920:2458): pid=12832 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:33.479370 kernel: audit: type=1104 audit(1707463892.920:2459): pid=12832 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:32.920000 audit[12832]: CRED_DISP pid=12832 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:32.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.101:22-147.75.109.163:49204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:37.930688 systemd[1]: Started sshd@101-139.178.90.101:22-147.75.109.163:45624.service. Feb 9 07:31:37.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.101:22-147.75.109.163:45624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:37.957664 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:31:37.957730 kernel: audit: type=1130 audit(1707463897.929:2461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.101:22-147.75.109.163:45624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:38.069000 audit[12896]: USER_ACCT pid=12896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:38.071070 sshd[12896]: Accepted publickey for core from 147.75.109.163 port 45624 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:38.072803 sshd[12896]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:38.075270 systemd-logind[1462]: New session 80 of user core. Feb 9 07:31:38.075822 systemd[1]: Started session-80.scope. Feb 9 07:31:38.157702 sshd[12896]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:38.159195 systemd[1]: sshd@101-139.178.90.101:22-147.75.109.163:45624.service: Deactivated successfully. Feb 9 07:31:38.159646 systemd[1]: session-80.scope: Deactivated successfully. Feb 9 07:31:38.160026 systemd-logind[1462]: Session 80 logged out. Waiting for processes to exit. Feb 9 07:31:38.160437 systemd-logind[1462]: Removed session 80. Feb 9 07:31:38.071000 audit[12896]: CRED_ACQ pid=12896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:38.255011 kernel: audit: type=1101 audit(1707463898.069:2462): pid=12896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:38.255049 kernel: audit: type=1103 audit(1707463898.071:2463): pid=12896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:38.255067 kernel: audit: type=1006 audit(1707463898.071:2464): pid=12896 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=80 res=1 Feb 9 07:31:38.313719 kernel: audit: type=1300 audit(1707463898.071:2464): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe01d71c20 a2=3 a3=0 items=0 ppid=1 pid=12896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:38.071000 audit[12896]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe01d71c20 a2=3 a3=0 items=0 ppid=1 pid=12896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:38.405855 kernel: audit: type=1327 audit(1707463898.071:2464): proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:38.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:38.436358 kernel: audit: type=1105 audit(1707463898.076:2465): pid=12896 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:38.076000 audit[12896]: USER_START pid=12896 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:38.530903 kernel: audit: type=1103 audit(1707463898.077:2466): pid=12898 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:38.077000 audit[12898]: CRED_ACQ pid=12898 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:38.620212 kernel: audit: type=1106 audit(1707463898.156:2467): pid=12896 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:38.156000 audit[12896]: USER_END pid=12896 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:38.715808 kernel: audit: type=1104 audit(1707463898.156:2468): pid=12896 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:38.156000 audit[12896]: CRED_DISP pid=12896 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:38.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.101:22-147.75.109.163:45624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:43.171071 systemd[1]: Started sshd@102-139.178.90.101:22-147.75.109.163:45628.service. Feb 9 07:31:43.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.101:22-147.75.109.163:45628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:43.197923 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:31:43.197998 kernel: audit: type=1130 audit(1707463903.170:2470): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.101:22-147.75.109.163:45628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:43.307000 audit[12924]: USER_ACCT pid=12924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:43.309050 sshd[12924]: Accepted publickey for core from 147.75.109.163 port 45628 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:43.310989 sshd[12924]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:43.313528 systemd-logind[1462]: New session 81 of user core. Feb 9 07:31:43.314206 systemd[1]: Started session-81.scope. Feb 9 07:31:43.309000 audit[12924]: CRED_ACQ pid=12924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:43.491146 kernel: audit: type=1101 audit(1707463903.307:2471): pid=12924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:43.491184 kernel: audit: type=1103 audit(1707463903.309:2472): pid=12924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:43.491202 kernel: audit: type=1006 audit(1707463903.309:2473): pid=12924 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=81 res=1 Feb 9 07:31:43.549844 kernel: audit: type=1300 audit(1707463903.309:2473): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddd349ee0 a2=3 a3=0 items=0 ppid=1 pid=12924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:43.309000 audit[12924]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddd349ee0 a2=3 a3=0 items=0 ppid=1 pid=12924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:43.309000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:43.642196 sshd[12924]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:43.643587 systemd[1]: sshd@102-139.178.90.101:22-147.75.109.163:45628.service: Deactivated successfully. Feb 9 07:31:43.644032 systemd[1]: session-81.scope: Deactivated successfully. Feb 9 07:31:43.644346 systemd-logind[1462]: Session 81 logged out. Waiting for processes to exit. Feb 9 07:31:43.644905 systemd-logind[1462]: Removed session 81. Feb 9 07:31:43.672482 kernel: audit: type=1327 audit(1707463903.309:2473): proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:43.672521 kernel: audit: type=1105 audit(1707463903.314:2474): pid=12924 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:43.314000 audit[12924]: USER_START pid=12924 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:43.767176 kernel: audit: type=1103 audit(1707463903.315:2475): pid=12926 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:43.315000 audit[12926]: CRED_ACQ pid=12926 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:43.856509 kernel: audit: type=1106 audit(1707463903.641:2476): pid=12924 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:43.641000 audit[12924]: USER_END pid=12924 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:43.641000 audit[12924]: CRED_DISP pid=12924 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:44.041580 kernel: audit: type=1104 audit(1707463903.641:2477): pid=12924 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:43.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.101:22-147.75.109.163:45628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:48.588402 systemd[1]: Started sshd@103-139.178.90.101:22-147.75.109.163:53780.service. Feb 9 07:31:48.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.101:22-147.75.109.163:53780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:48.615313 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:31:48.615351 kernel: audit: type=1130 audit(1707463908.586:2479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.101:22-147.75.109.163:53780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:48.638204 sshd[12949]: Accepted publickey for core from 147.75.109.163 port 53780 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:48.639848 sshd[12949]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:48.642575 systemd-logind[1462]: New session 82 of user core. Feb 9 07:31:48.643313 systemd[1]: Started session-82.scope. Feb 9 07:31:48.636000 audit[12949]: USER_ACCT pid=12949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:48.795918 kernel: audit: type=1101 audit(1707463908.636:2480): pid=12949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:48.795976 kernel: audit: type=1103 audit(1707463908.638:2481): pid=12949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:48.638000 audit[12949]: CRED_ACQ pid=12949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:48.724665 systemd[1]: sshd@103-139.178.90.101:22-147.75.109.163:53780.service: Deactivated successfully. Feb 9 07:31:48.722624 sshd[12949]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:48.725020 systemd[1]: session-82.scope: Deactivated successfully. Feb 9 07:31:48.725323 systemd-logind[1462]: Session 82 logged out. Waiting for processes to exit. Feb 9 07:31:48.726023 systemd[1]: Started sshd@104-139.178.90.101:22-147.75.109.163:53792.service. Feb 9 07:31:48.726378 systemd-logind[1462]: Removed session 82. Feb 9 07:31:48.886516 kernel: audit: type=1006 audit(1707463908.638:2482): pid=12949 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=82 res=1 Feb 9 07:31:48.909144 sshd[12974]: Accepted publickey for core from 147.75.109.163 port 53792 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:48.638000 audit[12949]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff64d0d410 a2=3 a3=0 items=0 ppid=1 pid=12949 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:48.946043 sshd[12974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:48.948455 systemd-logind[1462]: New session 83 of user core. Feb 9 07:31:48.949088 systemd[1]: Started session-83.scope. Feb 9 07:31:49.037250 kernel: audit: type=1300 audit(1707463908.638:2482): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff64d0d410 a2=3 a3=0 items=0 ppid=1 pid=12949 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:49.037325 kernel: audit: type=1327 audit(1707463908.638:2482): proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:48.638000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:49.067762 kernel: audit: type=1105 audit(1707463908.644:2483): pid=12949 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:48.644000 audit[12949]: USER_START pid=12949 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:49.162323 kernel: audit: type=1103 audit(1707463908.645:2484): pid=12951 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:48.645000 audit[12951]: CRED_ACQ pid=12951 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:48.721000 audit[12949]: USER_END pid=12949 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:49.347229 kernel: audit: type=1106 audit(1707463908.721:2485): pid=12949 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:49.347265 kernel: audit: type=1104 audit(1707463908.721:2486): pid=12949 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:48.721000 audit[12949]: CRED_DISP pid=12949 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:48.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.101:22-147.75.109.163:53780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:48.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.101:22-147.75.109.163:53792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:48.907000 audit[12974]: USER_ACCT pid=12974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:48.944000 audit[12974]: CRED_ACQ pid=12974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:48.944000 audit[12974]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5ed41eb0 a2=3 a3=0 items=0 ppid=1 pid=12974 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:48.944000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:48.949000 audit[12974]: USER_START pid=12974 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:48.950000 audit[12976]: CRED_ACQ pid=12976 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:50.229773 sshd[12974]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:50.230000 audit[12974]: USER_END pid=12974 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:50.231000 audit[12974]: CRED_DISP pid=12974 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:50.237162 systemd[1]: sshd@104-139.178.90.101:22-147.75.109.163:53792.service: Deactivated successfully. Feb 9 07:31:50.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.101:22-147.75.109.163:53792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:50.237610 systemd[1]: session-83.scope: Deactivated successfully. Feb 9 07:31:50.237993 systemd-logind[1462]: Session 83 logged out. Waiting for processes to exit. Feb 9 07:31:50.238755 systemd[1]: Started sshd@105-139.178.90.101:22-147.75.109.163:53804.service. Feb 9 07:31:50.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.101:22-147.75.109.163:53804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:50.239214 systemd-logind[1462]: Removed session 83. Feb 9 07:31:50.265000 audit[13022]: USER_ACCT pid=13022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:50.267097 sshd[13022]: Accepted publickey for core from 147.75.109.163 port 53804 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:50.266000 audit[13022]: CRED_ACQ pid=13022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:50.266000 audit[13022]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0c2ba790 a2=3 a3=0 items=0 ppid=1 pid=13022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:50.266000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:50.267941 sshd[13022]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:50.271121 systemd-logind[1462]: New session 84 of user core. Feb 9 07:31:50.271935 systemd[1]: Started session-84.scope. Feb 9 07:31:50.274000 audit[13022]: USER_START pid=13022 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:50.275000 audit[13024]: CRED_ACQ pid=13024 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.091000 audit[13049]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=13049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:31:51.091000 audit[13049]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7fff8b197550 a2=0 a3=7fff8b19753c items=0 ppid=2848 pid=13049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:51.091000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:31:51.098399 sshd[13022]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:51.097000 audit[13022]: USER_END pid=13022 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.097000 audit[13022]: CRED_DISP pid=13022 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.100588 systemd[1]: sshd@105-139.178.90.101:22-147.75.109.163:53804.service: Deactivated successfully. Feb 9 07:31:51.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.101:22-147.75.109.163:53804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:51.101112 systemd[1]: session-84.scope: Deactivated successfully. Feb 9 07:31:51.101544 systemd-logind[1462]: Session 84 logged out. Waiting for processes to exit. Feb 9 07:31:51.102433 systemd[1]: Started sshd@106-139.178.90.101:22-147.75.109.163:53818.service. Feb 9 07:31:51.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.101:22-147.75.109.163:53818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:51.102996 systemd-logind[1462]: Removed session 84. Feb 9 07:31:51.091000 audit[13049]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=13049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:31:51.091000 audit[13049]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7fff8b197550 a2=0 a3=31030 items=0 ppid=2848 pid=13049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:51.091000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:31:51.117000 audit[13055]: NETFILTER_CFG table=filter:127 family=2 entries=32 op=nft_register_rule pid=13055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:31:51.117000 audit[13055]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc9a1ad460 a2=0 a3=7ffc9a1ad44c items=0 ppid=2848 pid=13055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:51.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:31:51.119000 audit[13055]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=13055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 07:31:51.119000 audit[13055]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffc9a1ad460 a2=0 a3=31030 items=0 ppid=2848 pid=13055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:51.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 07:31:51.136917 sshd[13052]: Accepted publickey for core from 147.75.109.163 port 53818 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:51.136000 audit[13052]: USER_ACCT pid=13052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.136000 audit[13052]: CRED_ACQ pid=13052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.136000 audit[13052]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9ebe2e10 a2=3 a3=0 items=0 ppid=1 pid=13052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:51.136000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:51.137953 sshd[13052]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:51.140844 systemd-logind[1462]: New session 85 of user core. Feb 9 07:31:51.141428 systemd[1]: Started session-85.scope. Feb 9 07:31:51.142000 audit[13052]: USER_START pid=13052 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.143000 audit[13057]: CRED_ACQ pid=13057 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.373041 sshd[13052]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:51.372000 audit[13052]: USER_END pid=13052 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.372000 audit[13052]: CRED_DISP pid=13052 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.375007 systemd[1]: sshd@106-139.178.90.101:22-147.75.109.163:53818.service: Deactivated successfully. Feb 9 07:31:51.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.101:22-147.75.109.163:53818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:51.375369 systemd[1]: session-85.scope: Deactivated successfully. Feb 9 07:31:51.375712 systemd-logind[1462]: Session 85 logged out. Waiting for processes to exit. Feb 9 07:31:51.376318 systemd[1]: Started sshd@107-139.178.90.101:22-147.75.109.163:53828.service. Feb 9 07:31:51.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.101:22-147.75.109.163:53828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:51.376801 systemd-logind[1462]: Removed session 85. Feb 9 07:31:51.403000 audit[13078]: USER_ACCT pid=13078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.405798 sshd[13078]: Accepted publickey for core from 147.75.109.163 port 53828 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:51.406000 audit[13078]: CRED_ACQ pid=13078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.406000 audit[13078]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce6184fe0 a2=3 a3=0 items=0 ppid=1 pid=13078 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:51.406000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:51.408874 sshd[13078]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:51.418701 systemd-logind[1462]: New session 86 of user core. Feb 9 07:31:51.421136 systemd[1]: Started session-86.scope. Feb 9 07:31:51.435000 audit[13078]: USER_START pid=13078 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.438000 audit[13080]: CRED_ACQ pid=13080 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.561694 sshd[13078]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:51.560000 audit[13078]: USER_END pid=13078 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.560000 audit[13078]: CRED_DISP pid=13078 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:51.563196 systemd[1]: sshd@107-139.178.90.101:22-147.75.109.163:53828.service: Deactivated successfully. Feb 9 07:31:51.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.101:22-147.75.109.163:53828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:51.563668 systemd[1]: session-86.scope: Deactivated successfully. Feb 9 07:31:51.564075 systemd-logind[1462]: Session 86 logged out. Waiting for processes to exit. Feb 9 07:31:51.564474 systemd-logind[1462]: Removed session 86. Feb 9 07:31:56.570836 systemd[1]: Started sshd@108-139.178.90.101:22-147.75.109.163:59272.service. Feb 9 07:31:56.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.101:22-147.75.109.163:59272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:56.598248 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 9 07:31:56.598323 kernel: audit: type=1130 audit(1707463916.569:2528): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.101:22-147.75.109.163:59272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:56.709000 audit[13143]: USER_ACCT pid=13143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:56.711019 sshd[13143]: Accepted publickey for core from 147.75.109.163 port 59272 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:31:56.712807 sshd[13143]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:31:56.715342 systemd-logind[1462]: New session 87 of user core. Feb 9 07:31:56.716403 systemd[1]: Started session-87.scope. Feb 9 07:31:56.797225 sshd[13143]: pam_unix(sshd:session): session closed for user core Feb 9 07:31:56.799145 systemd[1]: sshd@108-139.178.90.101:22-147.75.109.163:59272.service: Deactivated successfully. Feb 9 07:31:56.799600 systemd[1]: session-87.scope: Deactivated successfully. Feb 9 07:31:56.799988 systemd-logind[1462]: Session 87 logged out. Waiting for processes to exit. Feb 9 07:31:56.800411 systemd-logind[1462]: Removed session 87. Feb 9 07:31:56.711000 audit[13143]: CRED_ACQ pid=13143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:56.893135 kernel: audit: type=1101 audit(1707463916.709:2529): pid=13143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:56.893171 kernel: audit: type=1103 audit(1707463916.711:2530): pid=13143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:56.893192 kernel: audit: type=1006 audit(1707463916.711:2531): pid=13143 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=87 res=1 Feb 9 07:31:56.711000 audit[13143]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2bb4ab20 a2=3 a3=0 items=0 ppid=1 pid=13143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:57.043906 kernel: audit: type=1300 audit(1707463916.711:2531): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2bb4ab20 a2=3 a3=0 items=0 ppid=1 pid=13143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:31:57.043940 kernel: audit: type=1327 audit(1707463916.711:2531): proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:56.711000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:31:56.717000 audit[13143]: USER_START pid=13143 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:57.169039 kernel: audit: type=1105 audit(1707463916.717:2532): pid=13143 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:57.169071 kernel: audit: type=1103 audit(1707463916.717:2533): pid=13145 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:56.717000 audit[13145]: CRED_ACQ pid=13145 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:57.258495 kernel: audit: type=1106 audit(1707463916.796:2534): pid=13143 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:56.796000 audit[13143]: USER_END pid=13143 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:57.354109 kernel: audit: type=1104 audit(1707463916.796:2535): pid=13143 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:56.796000 audit[13143]: CRED_DISP pid=13143 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:31:56.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.101:22-147.75.109.163:59272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:01.806890 systemd[1]: Started sshd@109-139.178.90.101:22-147.75.109.163:59284.service. Feb 9 07:32:01.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.101:22-147.75.109.163:59284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:01.833947 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:32:01.834028 kernel: audit: type=1130 audit(1707463921.805:2537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.101:22-147.75.109.163:59284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:01.945000 audit[13168]: USER_ACCT pid=13168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:01.947232 sshd[13168]: Accepted publickey for core from 147.75.109.163 port 59284 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:32:01.947886 sshd[13168]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:32:01.950910 systemd-logind[1462]: New session 88 of user core. Feb 9 07:32:01.952003 systemd[1]: Started session-88.scope. Feb 9 07:32:01.946000 audit[13168]: CRED_ACQ pid=13168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:02.044019 sshd[13168]: pam_unix(sshd:session): session closed for user core Feb 9 07:32:02.045533 systemd[1]: sshd@109-139.178.90.101:22-147.75.109.163:59284.service: Deactivated successfully. Feb 9 07:32:02.046201 systemd[1]: session-88.scope: Deactivated successfully. Feb 9 07:32:02.046739 systemd-logind[1462]: Session 88 logged out. Waiting for processes to exit. Feb 9 07:32:02.047242 systemd-logind[1462]: Removed session 88. Feb 9 07:32:02.129419 kernel: audit: type=1101 audit(1707463921.945:2538): pid=13168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:02.129463 kernel: audit: type=1103 audit(1707463921.946:2539): pid=13168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:02.129483 kernel: audit: type=1006 audit(1707463921.946:2540): pid=13168 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=88 res=1 Feb 9 07:32:02.188121 kernel: audit: type=1300 audit(1707463921.946:2540): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8262ca90 a2=3 a3=0 items=0 ppid=1 pid=13168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:01.946000 audit[13168]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8262ca90 a2=3 a3=0 items=0 ppid=1 pid=13168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:02.280226 kernel: audit: type=1327 audit(1707463921.946:2540): proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:01.946000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:02.310773 kernel: audit: type=1105 audit(1707463921.953:2541): pid=13168 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:01.953000 audit[13168]: USER_START pid=13168 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:02.405304 kernel: audit: type=1103 audit(1707463921.953:2542): pid=13171 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:01.953000 audit[13171]: CRED_ACQ pid=13171 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:02.494576 kernel: audit: type=1106 audit(1707463922.043:2543): pid=13168 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:02.043000 audit[13168]: USER_END pid=13168 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:02.043000 audit[13168]: CRED_DISP pid=13168 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:02.590498 kernel: audit: type=1104 audit(1707463922.043:2544): pid=13168 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:02.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.101:22-147.75.109.163:59284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:07.053599 systemd[1]: Started sshd@110-139.178.90.101:22-147.75.109.163:47500.service. Feb 9 07:32:07.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.101:22-147.75.109.163:47500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:07.080573 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:32:07.080666 kernel: audit: type=1130 audit(1707463927.052:2546): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.101:22-147.75.109.163:47500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:07.193000 audit[13212]: USER_ACCT pid=13212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:07.194078 sshd[13212]: Accepted publickey for core from 147.75.109.163 port 47500 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:32:07.195264 sshd[13212]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:32:07.197759 systemd-logind[1462]: New session 89 of user core. Feb 9 07:32:07.198263 systemd[1]: Started session-89.scope. Feb 9 07:32:07.285505 kernel: audit: type=1101 audit(1707463927.193:2547): pid=13212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:07.285580 kernel: audit: type=1103 audit(1707463927.193:2548): pid=13212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:07.193000 audit[13212]: CRED_ACQ pid=13212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:07.287862 sshd[13212]: pam_unix(sshd:session): session closed for user core Feb 9 07:32:07.289216 systemd[1]: sshd@110-139.178.90.101:22-147.75.109.163:47500.service: Deactivated successfully. Feb 9 07:32:07.289671 systemd[1]: session-89.scope: Deactivated successfully. Feb 9 07:32:07.289967 systemd-logind[1462]: Session 89 logged out. Waiting for processes to exit. Feb 9 07:32:07.290507 systemd-logind[1462]: Removed session 89. Feb 9 07:32:07.434819 kernel: audit: type=1006 audit(1707463927.193:2549): pid=13212 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=89 res=1 Feb 9 07:32:07.434850 kernel: audit: type=1300 audit(1707463927.193:2549): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6c64d300 a2=3 a3=0 items=0 ppid=1 pid=13212 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:07.193000 audit[13212]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6c64d300 a2=3 a3=0 items=0 ppid=1 pid=13212 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:07.193000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:07.557365 kernel: audit: type=1327 audit(1707463927.193:2549): proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:07.557401 kernel: audit: type=1105 audit(1707463927.198:2550): pid=13212 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:07.198000 audit[13212]: USER_START pid=13212 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:07.651919 kernel: audit: type=1103 audit(1707463927.199:2551): pid=13214 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:07.199000 audit[13214]: CRED_ACQ pid=13214 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:07.287000 audit[13212]: USER_END pid=13212 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:07.836843 kernel: audit: type=1106 audit(1707463927.287:2552): pid=13212 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:07.836878 kernel: audit: type=1104 audit(1707463927.287:2553): pid=13212 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:07.287000 audit[13212]: CRED_DISP pid=13212 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:07.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.101:22-147.75.109.163:47500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:12.296919 systemd[1]: Started sshd@111-139.178.90.101:22-147.75.109.163:47506.service. Feb 9 07:32:12.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.101:22-147.75.109.163:47506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:12.324064 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:32:12.324144 kernel: audit: type=1130 audit(1707463932.295:2555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.101:22-147.75.109.163:47506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:12.436000 audit[13240]: USER_ACCT pid=13240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:12.437050 sshd[13240]: Accepted publickey for core from 147.75.109.163 port 47506 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:32:12.438470 sshd[13240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:32:12.440877 systemd-logind[1462]: New session 90 of user core. Feb 9 07:32:12.441309 systemd[1]: Started session-90.scope. Feb 9 07:32:12.436000 audit[13240]: CRED_ACQ pid=13240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:12.530570 sshd[13240]: pam_unix(sshd:session): session closed for user core Feb 9 07:32:12.532015 systemd[1]: sshd@111-139.178.90.101:22-147.75.109.163:47506.service: Deactivated successfully. Feb 9 07:32:12.532463 systemd[1]: session-90.scope: Deactivated successfully. Feb 9 07:32:12.532882 systemd-logind[1462]: Session 90 logged out. Waiting for processes to exit. Feb 9 07:32:12.533384 systemd-logind[1462]: Removed session 90. Feb 9 07:32:12.619128 kernel: audit: type=1101 audit(1707463932.436:2556): pid=13240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:12.619170 kernel: audit: type=1103 audit(1707463932.436:2557): pid=13240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:12.619189 kernel: audit: type=1006 audit(1707463932.436:2558): pid=13240 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=90 res=1 Feb 9 07:32:12.677824 kernel: audit: type=1300 audit(1707463932.436:2558): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee3721c10 a2=3 a3=0 items=0 ppid=1 pid=13240 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:12.436000 audit[13240]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee3721c10 a2=3 a3=0 items=0 ppid=1 pid=13240 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:12.769973 kernel: audit: type=1327 audit(1707463932.436:2558): proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:12.436000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:12.442000 audit[13240]: USER_START pid=13240 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:12.895071 kernel: audit: type=1105 audit(1707463932.442:2559): pid=13240 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:12.895105 kernel: audit: type=1103 audit(1707463932.442:2560): pid=13242 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:12.442000 audit[13242]: CRED_ACQ pid=13242 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:12.984461 kernel: audit: type=1106 audit(1707463932.530:2561): pid=13240 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:12.530000 audit[13240]: USER_END pid=13240 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:13.080123 kernel: audit: type=1104 audit(1707463932.530:2562): pid=13240 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:12.530000 audit[13240]: CRED_DISP pid=13240 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:12.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.101:22-147.75.109.163:47506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:15.889000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:32:15.889000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00218e3e0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:32:15.889000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:32:16.077000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:32:16.077000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001cd0100 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:32:16.077000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:32:17.536842 systemd[1]: Started sshd@112-139.178.90.101:22-147.75.109.163:35320.service. Feb 9 07:32:17.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.101:22-147.75.109.163:35320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:17.564067 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 07:32:17.564143 kernel: audit: type=1130 audit(1707463937.536:2566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.101:22-147.75.109.163:35320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:17.677000 audit[13265]: USER_ACCT pid=13265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:17.677997 sshd[13265]: Accepted publickey for core from 147.75.109.163 port 35320 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:32:17.679803 sshd[13265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:32:17.682162 systemd-logind[1462]: New session 91 of user core. Feb 9 07:32:17.682618 systemd[1]: Started session-91.scope. Feb 9 07:32:17.763061 sshd[13265]: pam_unix(sshd:session): session closed for user core Feb 9 07:32:17.764516 systemd[1]: sshd@112-139.178.90.101:22-147.75.109.163:35320.service: Deactivated successfully. Feb 9 07:32:17.764974 systemd[1]: session-91.scope: Deactivated successfully. Feb 9 07:32:17.765303 systemd-logind[1462]: Session 91 logged out. Waiting for processes to exit. Feb 9 07:32:17.765734 systemd-logind[1462]: Removed session 91. Feb 9 07:32:17.679000 audit[13265]: CRED_ACQ pid=13265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:17.860089 kernel: audit: type=1101 audit(1707463937.677:2567): pid=13265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:17.860134 kernel: audit: type=1103 audit(1707463937.679:2568): pid=13265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:17.860150 kernel: audit: type=1006 audit(1707463937.679:2569): pid=13265 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=91 res=1 Feb 9 07:32:17.918815 kernel: audit: type=1300 audit(1707463937.679:2569): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4281abc0 a2=3 a3=0 items=0 ppid=1 pid=13265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:17.679000 audit[13265]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4281abc0 a2=3 a3=0 items=0 ppid=1 pid=13265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:18.010982 kernel: audit: type=1327 audit(1707463937.679:2569): proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:17.679000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:18.041512 kernel: audit: type=1105 audit(1707463937.684:2570): pid=13265 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:17.684000 audit[13265]: USER_START pid=13265 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:18.136129 kernel: audit: type=1103 audit(1707463937.684:2571): pid=13267 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:17.684000 audit[13267]: CRED_ACQ pid=13267 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:18.225524 kernel: audit: type=1106 audit(1707463937.763:2572): pid=13265 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:17.763000 audit[13265]: USER_END pid=13265 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:17.763000 audit[13265]: CRED_DISP pid=13265 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:18.410801 kernel: audit: type=1104 audit(1707463937.763:2573): pid=13265 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:17.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.101:22-147.75.109.163:35320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:19.898000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:32:19.898000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ea9340 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:32:19.898000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:32:19.898000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:32:19.898000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002633a10 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:32:19.898000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:32:19.947000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:32:19.947000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c006da5e00 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:32:19.947000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:32:19.947000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:32:19.947000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0149fb100 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:32:19.947000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:32:19.948000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:32:19.948000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0149fb120 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:32:19.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:32:19.948000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:32:19.948000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:32:19.948000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c014768180 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:32:19.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:32:19.948000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0143b2b10 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:32:19.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:32:19.986000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:32:19.986000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0143b2b70 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:32:19.986000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:32:22.773135 systemd[1]: Started sshd@113-139.178.90.101:22-147.75.109.163:35324.service. Feb 9 07:32:22.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.101:22-147.75.109.163:35324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:22.799720 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 07:32:22.799756 kernel: audit: type=1130 audit(1707463942.772:2583): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.101:22-147.75.109.163:35324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:22.912000 audit[13312]: USER_ACCT pid=13312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:22.912905 sshd[13312]: Accepted publickey for core from 147.75.109.163 port 35324 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:32:22.914171 sshd[13312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:32:22.916969 systemd-logind[1462]: New session 92 of user core. Feb 9 07:32:22.918008 systemd[1]: Started session-92.scope. Feb 9 07:32:22.913000 audit[13312]: CRED_ACQ pid=13312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:23.004525 kernel: audit: type=1101 audit(1707463942.912:2584): pid=13312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:23.004562 kernel: audit: type=1103 audit(1707463942.913:2585): pid=13312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:23.080998 sshd[13312]: pam_unix(sshd:session): session closed for user core Feb 9 07:32:23.082330 systemd[1]: sshd@113-139.178.90.101:22-147.75.109.163:35324.service: Deactivated successfully. Feb 9 07:32:23.082778 systemd[1]: session-92.scope: Deactivated successfully. Feb 9 07:32:23.083127 systemd-logind[1462]: Session 92 logged out. Waiting for processes to exit. Feb 9 07:32:23.083517 systemd-logind[1462]: Removed session 92. Feb 9 07:32:23.153946 kernel: audit: type=1006 audit(1707463942.913:2586): pid=13312 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=92 res=1 Feb 9 07:32:23.153979 kernel: audit: type=1300 audit(1707463942.913:2586): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7be94ff0 a2=3 a3=0 items=0 ppid=1 pid=13312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:22.913000 audit[13312]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7be94ff0 a2=3 a3=0 items=0 ppid=1 pid=13312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:23.246101 kernel: audit: type=1327 audit(1707463942.913:2586): proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:22.913000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:22.920000 audit[13312]: USER_START pid=13312 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:23.371323 kernel: audit: type=1105 audit(1707463942.920:2587): pid=13312 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:23.371359 kernel: audit: type=1103 audit(1707463942.921:2588): pid=13315 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:22.921000 audit[13315]: CRED_ACQ pid=13315 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:23.081000 audit[13312]: USER_END pid=13312 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:23.461572 kernel: audit: type=1106 audit(1707463943.081:2589): pid=13312 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:23.081000 audit[13312]: CRED_DISP pid=13312 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:23.647660 kernel: audit: type=1104 audit(1707463943.081:2590): pid=13312 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:23.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.101:22-147.75.109.163:35324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:24.040000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:32:24.040000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0002c3b60 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:32:24.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:32:24.040000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:32:24.040000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001cb2cc0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:32:24.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:32:24.040000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:32:24.040000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ea9420 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:32:24.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:32:24.040000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:32:24.040000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c001150020 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:32:24.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:32:28.091120 systemd[1]: Started sshd@114-139.178.90.101:22-147.75.109.163:50238.service. Feb 9 07:32:28.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.101:22-147.75.109.163:50238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:28.118168 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 07:32:28.118396 kernel: audit: type=1130 audit(1707463948.090:2596): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.101:22-147.75.109.163:50238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:28.231664 sshd[13392]: Accepted publickey for core from 147.75.109.163 port 50238 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:32:28.231000 audit[13392]: USER_ACCT pid=13392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:28.233050 sshd[13392]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:32:28.235421 systemd-logind[1462]: New session 93 of user core. Feb 9 07:32:28.235930 systemd[1]: Started session-93.scope. Feb 9 07:32:28.315294 sshd[13392]: pam_unix(sshd:session): session closed for user core Feb 9 07:32:28.316683 systemd[1]: sshd@114-139.178.90.101:22-147.75.109.163:50238.service: Deactivated successfully. Feb 9 07:32:28.317118 systemd[1]: session-93.scope: Deactivated successfully. Feb 9 07:32:28.317451 systemd-logind[1462]: Session 93 logged out. Waiting for processes to exit. Feb 9 07:32:28.318080 systemd-logind[1462]: Removed session 93. Feb 9 07:32:28.232000 audit[13392]: CRED_ACQ pid=13392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:28.416258 kernel: audit: type=1101 audit(1707463948.231:2597): pid=13392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:28.416304 kernel: audit: type=1103 audit(1707463948.232:2598): pid=13392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:28.416354 kernel: audit: type=1006 audit(1707463948.232:2599): pid=13392 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=93 res=1 Feb 9 07:32:28.232000 audit[13392]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb3702f10 a2=3 a3=0 items=0 ppid=1 pid=13392 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:28.567191 kernel: audit: type=1300 audit(1707463948.232:2599): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb3702f10 a2=3 a3=0 items=0 ppid=1 pid=13392 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:28.232000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:28.567505 kernel: audit: type=1327 audit(1707463948.232:2599): proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:28.237000 audit[13392]: USER_START pid=13392 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:28.692340 kernel: audit: type=1105 audit(1707463948.237:2600): pid=13392 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:28.692372 kernel: audit: type=1103 audit(1707463948.238:2601): pid=13394 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:28.238000 audit[13394]: CRED_ACQ pid=13394 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:28.781653 kernel: audit: type=1106 audit(1707463948.315:2602): pid=13392 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:28.315000 audit[13392]: USER_END pid=13392 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:28.315000 audit[13392]: CRED_DISP pid=13392 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:28.966658 kernel: audit: type=1104 audit(1707463948.315:2603): pid=13392 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:28.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.101:22-147.75.109.163:50238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:33.325154 systemd[1]: Started sshd@115-139.178.90.101:22-147.75.109.163:50252.service. Feb 9 07:32:33.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.101:22-147.75.109.163:50252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:33.352397 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:32:33.352470 kernel: audit: type=1130 audit(1707463953.324:2605): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.101:22-147.75.109.163:50252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:33.465000 audit[13417]: USER_ACCT pid=13417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:33.466372 sshd[13417]: Accepted publickey for core from 147.75.109.163 port 50252 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:32:33.467822 sshd[13417]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:32:33.470142 systemd-logind[1462]: New session 94 of user core. Feb 9 07:32:33.470625 systemd[1]: Started session-94.scope. Feb 9 07:32:33.550630 sshd[13417]: pam_unix(sshd:session): session closed for user core Feb 9 07:32:33.551969 systemd[1]: sshd@115-139.178.90.101:22-147.75.109.163:50252.service: Deactivated successfully. Feb 9 07:32:33.552399 systemd[1]: session-94.scope: Deactivated successfully. Feb 9 07:32:33.552760 systemd-logind[1462]: Session 94 logged out. Waiting for processes to exit. Feb 9 07:32:33.553273 systemd-logind[1462]: Removed session 94. Feb 9 07:32:33.467000 audit[13417]: CRED_ACQ pid=13417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:33.648407 kernel: audit: type=1101 audit(1707463953.465:2606): pid=13417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:33.648478 kernel: audit: type=1103 audit(1707463953.467:2607): pid=13417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:33.648500 kernel: audit: type=1006 audit(1707463953.467:2608): pid=13417 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=94 res=1 Feb 9 07:32:33.707121 kernel: audit: type=1300 audit(1707463953.467:2608): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3146e0c0 a2=3 a3=0 items=0 ppid=1 pid=13417 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=94 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:33.467000 audit[13417]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3146e0c0 a2=3 a3=0 items=0 ppid=1 pid=13417 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=94 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:33.799243 kernel: audit: type=1327 audit(1707463953.467:2608): proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:33.467000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:33.829743 kernel: audit: type=1105 audit(1707463953.472:2609): pid=13417 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:33.472000 audit[13417]: USER_START pid=13417 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:33.924337 kernel: audit: type=1103 audit(1707463953.472:2610): pid=13419 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:33.472000 audit[13419]: CRED_ACQ pid=13419 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:34.013693 kernel: audit: type=1106 audit(1707463953.550:2611): pid=13417 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:33.550000 audit[13417]: USER_END pid=13417 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:34.109279 kernel: audit: type=1104 audit(1707463953.550:2612): pid=13417 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:33.550000 audit[13417]: CRED_DISP pid=13417 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:33.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.101:22-147.75.109.163:50252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:38.560056 systemd[1]: Started sshd@116-139.178.90.101:22-147.75.109.163:50094.service. Feb 9 07:32:38.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.101:22-147.75.109.163:50094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:38.587334 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:32:38.587373 kernel: audit: type=1130 audit(1707463958.559:2614): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.101:22-147.75.109.163:50094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:38.699000 audit[13480]: USER_ACCT pid=13480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:38.700519 sshd[13480]: Accepted publickey for core from 147.75.109.163 port 50094 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:32:38.704787 sshd[13480]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:32:38.706941 systemd-logind[1462]: New session 95 of user core. Feb 9 07:32:38.707435 systemd[1]: Started session-95.scope. Feb 9 07:32:38.786517 sshd[13480]: pam_unix(sshd:session): session closed for user core Feb 9 07:32:38.788018 systemd[1]: sshd@116-139.178.90.101:22-147.75.109.163:50094.service: Deactivated successfully. Feb 9 07:32:38.788504 systemd[1]: session-95.scope: Deactivated successfully. Feb 9 07:32:38.788879 systemd-logind[1462]: Session 95 logged out. Waiting for processes to exit. Feb 9 07:32:38.789321 systemd-logind[1462]: Removed session 95. Feb 9 07:32:38.704000 audit[13480]: CRED_ACQ pid=13480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:38.882645 kernel: audit: type=1101 audit(1707463958.699:2615): pid=13480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:38.882738 kernel: audit: type=1103 audit(1707463958.704:2616): pid=13480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:38.882758 kernel: audit: type=1006 audit(1707463958.704:2617): pid=13480 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=95 res=1 Feb 9 07:32:38.704000 audit[13480]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc239b5900 a2=3 a3=0 items=0 ppid=1 pid=13480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=95 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:39.033400 kernel: audit: type=1300 audit(1707463958.704:2617): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc239b5900 a2=3 a3=0 items=0 ppid=1 pid=13480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=95 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:39.033436 kernel: audit: type=1327 audit(1707463958.704:2617): proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:38.704000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:39.063910 kernel: audit: type=1105 audit(1707463958.708:2618): pid=13480 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:38.708000 audit[13480]: USER_START pid=13480 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:39.158407 kernel: audit: type=1103 audit(1707463958.709:2619): pid=13482 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:38.709000 audit[13482]: CRED_ACQ pid=13482 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:38.786000 audit[13480]: USER_END pid=13480 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:39.343255 kernel: audit: type=1106 audit(1707463958.786:2620): pid=13480 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:39.343296 kernel: audit: type=1104 audit(1707463958.786:2621): pid=13480 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:38.786000 audit[13480]: CRED_DISP pid=13480 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:38.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.101:22-147.75.109.163:50094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:43.800119 systemd[1]: Started sshd@117-139.178.90.101:22-147.75.109.163:50108.service. Feb 9 07:32:43.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.101:22-147.75.109.163:50108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:43.828205 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:32:43.828275 kernel: audit: type=1130 audit(1707463963.800:2623): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.101:22-147.75.109.163:50108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:43.940000 audit[13509]: USER_ACCT pid=13509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:43.941795 sshd[13509]: Accepted publickey for core from 147.75.109.163 port 50108 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:32:43.944442 sshd[13509]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:32:43.949253 systemd-logind[1462]: New session 96 of user core. Feb 9 07:32:43.949781 systemd[1]: Started session-96.scope. Feb 9 07:32:44.029059 sshd[13509]: pam_unix(sshd:session): session closed for user core Feb 9 07:32:44.030418 systemd[1]: sshd@117-139.178.90.101:22-147.75.109.163:50108.service: Deactivated successfully. Feb 9 07:32:44.030852 systemd[1]: session-96.scope: Deactivated successfully. Feb 9 07:32:44.031220 systemd-logind[1462]: Session 96 logged out. Waiting for processes to exit. Feb 9 07:32:44.031679 systemd-logind[1462]: Removed session 96. Feb 9 07:32:43.943000 audit[13509]: CRED_ACQ pid=13509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:44.123432 kernel: audit: type=1101 audit(1707463963.940:2624): pid=13509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:44.123541 kernel: audit: type=1103 audit(1707463963.943:2625): pid=13509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:44.123599 kernel: audit: type=1006 audit(1707463963.943:2626): pid=13509 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=96 res=1 Feb 9 07:32:43.943000 audit[13509]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc51ee5da0 a2=3 a3=0 items=0 ppid=1 pid=13509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=96 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:44.182502 kernel: audit: type=1300 audit(1707463963.943:2626): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc51ee5da0 a2=3 a3=0 items=0 ppid=1 pid=13509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=96 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:43.943000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:44.304936 kernel: audit: type=1327 audit(1707463963.943:2626): proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:44.304995 kernel: audit: type=1105 audit(1707463963.951:2627): pid=13509 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:43.951000 audit[13509]: USER_START pid=13509 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:43.951000 audit[13511]: CRED_ACQ pid=13511 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:44.488735 kernel: audit: type=1103 audit(1707463963.951:2628): pid=13511 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:44.488786 kernel: audit: type=1106 audit(1707463964.029:2629): pid=13509 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:44.029000 audit[13509]: USER_END pid=13509 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:44.029000 audit[13509]: CRED_DISP pid=13509 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:44.673631 kernel: audit: type=1104 audit(1707463964.029:2630): pid=13509 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:44.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.101:22-147.75.109.163:50108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:49.038616 systemd[1]: Started sshd@118-139.178.90.101:22-147.75.109.163:56608.service. Feb 9 07:32:49.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.101:22-147.75.109.163:56608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:49.065656 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:32:49.065738 kernel: audit: type=1130 audit(1707463969.038:2632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.101:22-147.75.109.163:56608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:49.088872 sshd[13535]: Accepted publickey for core from 147.75.109.163 port 56608 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:32:49.090715 sshd[13535]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:32:49.093485 systemd-logind[1462]: New session 97 of user core. Feb 9 07:32:49.094171 systemd[1]: Started session-97.scope. Feb 9 07:32:49.088000 audit[13535]: USER_ACCT pid=13535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:49.156559 kernel: audit: type=1101 audit(1707463969.088:2633): pid=13535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:49.176910 sshd[13535]: pam_unix(sshd:session): session closed for user core Feb 9 07:32:49.178255 systemd[1]: sshd@118-139.178.90.101:22-147.75.109.163:56608.service: Deactivated successfully. Feb 9 07:32:49.178699 systemd[1]: session-97.scope: Deactivated successfully. Feb 9 07:32:49.179111 systemd-logind[1462]: Session 97 logged out. Waiting for processes to exit. Feb 9 07:32:49.179584 systemd-logind[1462]: Removed session 97. Feb 9 07:32:49.089000 audit[13535]: CRED_ACQ pid=13535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:49.338130 kernel: audit: type=1103 audit(1707463969.089:2634): pid=13535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:49.338178 kernel: audit: type=1006 audit(1707463969.089:2635): pid=13535 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=97 res=1 Feb 9 07:32:49.396779 kernel: audit: type=1300 audit(1707463969.089:2635): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdd171160 a2=3 a3=0 items=0 ppid=1 pid=13535 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=97 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:49.089000 audit[13535]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdd171160 a2=3 a3=0 items=0 ppid=1 pid=13535 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=97 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:49.488789 kernel: audit: type=1327 audit(1707463969.089:2635): proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:49.089000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:49.519278 kernel: audit: type=1105 audit(1707463969.098:2636): pid=13535 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:49.098000 audit[13535]: USER_START pid=13535 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:49.613792 kernel: audit: type=1103 audit(1707463969.098:2637): pid=13537 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:49.098000 audit[13537]: CRED_ACQ pid=13537 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:49.703069 kernel: audit: type=1106 audit(1707463969.177:2638): pid=13535 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:49.177000 audit[13535]: USER_END pid=13535 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:49.798612 kernel: audit: type=1104 audit(1707463969.177:2639): pid=13535 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:49.177000 audit[13535]: CRED_DISP pid=13535 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:49.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.101:22-147.75.109.163:56608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:54.188128 systemd[1]: Started sshd@119-139.178.90.101:22-147.75.109.163:56620.service. Feb 9 07:32:54.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.101:22-147.75.109.163:56620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:54.214856 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:32:54.214910 kernel: audit: type=1130 audit(1707463974.187:2641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.101:22-147.75.109.163:56620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:54.327000 audit[13625]: USER_ACCT pid=13625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:54.328004 sshd[13625]: Accepted publickey for core from 147.75.109.163 port 56620 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:32:54.329825 sshd[13625]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:32:54.332301 systemd-logind[1462]: New session 98 of user core. Feb 9 07:32:54.332859 systemd[1]: Started session-98.scope. Feb 9 07:32:54.412392 sshd[13625]: pam_unix(sshd:session): session closed for user core Feb 9 07:32:54.413894 systemd[1]: sshd@119-139.178.90.101:22-147.75.109.163:56620.service: Deactivated successfully. Feb 9 07:32:54.414340 systemd[1]: session-98.scope: Deactivated successfully. Feb 9 07:32:54.414698 systemd-logind[1462]: Session 98 logged out. Waiting for processes to exit. Feb 9 07:32:54.415456 systemd-logind[1462]: Removed session 98. Feb 9 07:32:54.329000 audit[13625]: CRED_ACQ pid=13625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:54.509870 kernel: audit: type=1101 audit(1707463974.327:2642): pid=13625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:54.509908 kernel: audit: type=1103 audit(1707463974.329:2643): pid=13625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:54.509925 kernel: audit: type=1006 audit(1707463974.329:2644): pid=13625 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=98 res=1 Feb 9 07:32:54.329000 audit[13625]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd53274200 a2=3 a3=0 items=0 ppid=1 pid=13625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=98 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:54.329000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:54.691215 kernel: audit: type=1300 audit(1707463974.329:2644): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd53274200 a2=3 a3=0 items=0 ppid=1 pid=13625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=98 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:54.691256 kernel: audit: type=1327 audit(1707463974.329:2644): proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:54.691274 kernel: audit: type=1105 audit(1707463974.334:2645): pid=13625 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:54.334000 audit[13625]: USER_START pid=13625 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:54.785775 kernel: audit: type=1103 audit(1707463974.335:2646): pid=13627 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:54.335000 audit[13627]: CRED_ACQ pid=13627 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:54.875061 kernel: audit: type=1106 audit(1707463974.412:2647): pid=13625 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:54.412000 audit[13625]: USER_END pid=13625 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:54.970729 kernel: audit: type=1104 audit(1707463974.412:2648): pid=13625 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:54.412000 audit[13625]: CRED_DISP pid=13625 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:54.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.101:22-147.75.109.163:56620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:59.423532 systemd[1]: Started sshd@120-139.178.90.101:22-147.75.109.163:38576.service. Feb 9 07:32:59.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.101:22-147.75.109.163:38576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:59.450723 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:32:59.450844 kernel: audit: type=1130 audit(1707463979.423:2650): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.101:22-147.75.109.163:38576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:32:59.564000 audit[13650]: USER_ACCT pid=13650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:59.564717 sshd[13650]: Accepted publickey for core from 147.75.109.163 port 38576 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:32:59.566378 sshd[13650]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:32:59.568910 systemd-logind[1462]: New session 99 of user core. Feb 9 07:32:59.569452 systemd[1]: Started session-99.scope. Feb 9 07:32:59.655278 sshd[13650]: pam_unix(sshd:session): session closed for user core Feb 9 07:32:59.656806 systemd[1]: sshd@120-139.178.90.101:22-147.75.109.163:38576.service: Deactivated successfully. Feb 9 07:32:59.657250 systemd[1]: session-99.scope: Deactivated successfully. Feb 9 07:32:59.657556 systemd-logind[1462]: Session 99 logged out. Waiting for processes to exit. Feb 9 07:32:59.565000 audit[13650]: CRED_ACQ pid=13650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:59.658343 systemd-logind[1462]: Removed session 99. Feb 9 07:32:59.748759 kernel: audit: type=1101 audit(1707463979.564:2651): pid=13650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:59.748800 kernel: audit: type=1103 audit(1707463979.565:2652): pid=13650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:59.748820 kernel: audit: type=1006 audit(1707463979.565:2653): pid=13650 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=99 res=1 Feb 9 07:32:59.807476 kernel: audit: type=1300 audit(1707463979.565:2653): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6621b3e0 a2=3 a3=0 items=0 ppid=1 pid=13650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=99 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:59.565000 audit[13650]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6621b3e0 a2=3 a3=0 items=0 ppid=1 pid=13650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=99 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:32:59.899579 kernel: audit: type=1327 audit(1707463979.565:2653): proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:59.565000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:32:59.930042 kernel: audit: type=1105 audit(1707463979.571:2654): pid=13650 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:59.571000 audit[13650]: USER_START pid=13650 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:59.572000 audit[13652]: CRED_ACQ pid=13652 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:00.113913 kernel: audit: type=1103 audit(1707463979.572:2655): pid=13652 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:00.113946 kernel: audit: type=1106 audit(1707463979.655:2656): pid=13650 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:59.655000 audit[13650]: USER_END pid=13650 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:00.209566 kernel: audit: type=1104 audit(1707463979.655:2657): pid=13650 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:59.655000 audit[13650]: CRED_DISP pid=13650 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:32:59.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.101:22-147.75.109.163:38576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:04.665015 systemd[1]: Started sshd@121-139.178.90.101:22-147.75.109.163:60230.service. Feb 9 07:33:04.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.90.101:22-147.75.109.163:60230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:04.691932 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:33:04.692018 kernel: audit: type=1130 audit(1707463984.664:2659): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.90.101:22-147.75.109.163:60230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:04.804000 audit[13696]: USER_ACCT pid=13696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:04.804734 sshd[13696]: Accepted publickey for core from 147.75.109.163 port 60230 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:33:04.805969 sshd[13696]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:33:04.808370 systemd-logind[1462]: New session 100 of user core. Feb 9 07:33:04.808859 systemd[1]: Started session-100.scope. Feb 9 07:33:04.889865 sshd[13696]: pam_unix(sshd:session): session closed for user core Feb 9 07:33:04.891209 systemd[1]: sshd@121-139.178.90.101:22-147.75.109.163:60230.service: Deactivated successfully. Feb 9 07:33:04.891653 systemd[1]: session-100.scope: Deactivated successfully. Feb 9 07:33:04.891991 systemd-logind[1462]: Session 100 logged out. Waiting for processes to exit. Feb 9 07:33:04.892408 systemd-logind[1462]: Removed session 100. Feb 9 07:33:04.805000 audit[13696]: CRED_ACQ pid=13696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:04.986807 kernel: audit: type=1101 audit(1707463984.804:2660): pid=13696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:04.986863 kernel: audit: type=1103 audit(1707463984.805:2661): pid=13696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:04.986882 kernel: audit: type=1006 audit(1707463984.805:2662): pid=13696 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=100 res=1 Feb 9 07:33:04.805000 audit[13696]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe94315bf0 a2=3 a3=0 items=0 ppid=1 pid=13696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=100 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:05.137882 kernel: audit: type=1300 audit(1707463984.805:2662): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe94315bf0 a2=3 a3=0 items=0 ppid=1 pid=13696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=100 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:05.137919 kernel: audit: type=1327 audit(1707463984.805:2662): proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:04.805000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:05.168414 kernel: audit: type=1105 audit(1707463984.810:2663): pid=13696 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:04.810000 audit[13696]: USER_START pid=13696 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:05.263057 kernel: audit: type=1103 audit(1707463984.811:2664): pid=13698 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:04.811000 audit[13698]: CRED_ACQ pid=13698 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:05.352444 kernel: audit: type=1106 audit(1707463984.889:2665): pid=13696 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:04.889000 audit[13696]: USER_END pid=13696 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:05.448260 kernel: audit: type=1104 audit(1707463984.890:2666): pid=13696 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:04.890000 audit[13696]: CRED_DISP pid=13696 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:04.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.90.101:22-147.75.109.163:60230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:09.899461 systemd[1]: Started sshd@122-139.178.90.101:22-147.75.109.163:60242.service. Feb 9 07:33:09.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.101:22-147.75.109.163:60242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:09.926754 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:33:09.926859 kernel: audit: type=1130 audit(1707463989.899:2668): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.101:22-147.75.109.163:60242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:10.039000 audit[13723]: USER_ACCT pid=13723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:10.040097 sshd[13723]: Accepted publickey for core from 147.75.109.163 port 60242 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:33:10.041467 sshd[13723]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:33:10.043978 systemd-logind[1462]: New session 101 of user core. Feb 9 07:33:10.044503 systemd[1]: Started session-101.scope. Feb 9 07:33:10.040000 audit[13723]: CRED_ACQ pid=13723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:10.222193 kernel: audit: type=1101 audit(1707463990.039:2669): pid=13723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:10.222239 kernel: audit: type=1103 audit(1707463990.040:2670): pid=13723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:10.222257 kernel: audit: type=1006 audit(1707463990.040:2671): pid=13723 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=101 res=1 Feb 9 07:33:10.280976 kernel: audit: type=1300 audit(1707463990.040:2671): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd010b9090 a2=3 a3=0 items=0 ppid=1 pid=13723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=101 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:10.040000 audit[13723]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd010b9090 a2=3 a3=0 items=0 ppid=1 pid=13723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=101 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:10.040000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:10.373355 sshd[13723]: pam_unix(sshd:session): session closed for user core Feb 9 07:33:10.374723 systemd[1]: sshd@122-139.178.90.101:22-147.75.109.163:60242.service: Deactivated successfully. Feb 9 07:33:10.375176 systemd[1]: session-101.scope: Deactivated successfully. Feb 9 07:33:10.375464 systemd-logind[1462]: Session 101 logged out. Waiting for processes to exit. Feb 9 07:33:10.375989 systemd-logind[1462]: Removed session 101. Feb 9 07:33:10.403598 kernel: audit: type=1327 audit(1707463990.040:2671): proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:10.403636 kernel: audit: type=1105 audit(1707463990.046:2672): pid=13723 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:10.046000 audit[13723]: USER_START pid=13723 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:10.498207 kernel: audit: type=1103 audit(1707463990.047:2673): pid=13725 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:10.047000 audit[13725]: CRED_ACQ pid=13725 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:10.587572 kernel: audit: type=1106 audit(1707463990.373:2674): pid=13723 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:10.373000 audit[13723]: USER_END pid=13723 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:10.373000 audit[13723]: CRED_DISP pid=13723 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:10.772572 kernel: audit: type=1104 audit(1707463990.373:2675): pid=13723 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:10.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.101:22-147.75.109.163:60242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:15.326752 systemd[1]: Started sshd@123-139.178.90.101:22-147.75.109.163:45242.service. Feb 9 07:33:15.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.101:22-147.75.109.163:45242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:15.354007 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:33:15.354047 kernel: audit: type=1130 audit(1707463995.326:2677): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.101:22-147.75.109.163:45242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:15.467000 audit[13755]: USER_ACCT pid=13755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:15.468207 sshd[13755]: Accepted publickey for core from 147.75.109.163 port 45242 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:33:15.471821 sshd[13755]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:33:15.481559 systemd-logind[1462]: New session 102 of user core. Feb 9 07:33:15.484035 systemd[1]: Started session-102.scope. Feb 9 07:33:15.470000 audit[13755]: CRED_ACQ pid=13755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:15.572842 sshd[13755]: pam_unix(sshd:session): session closed for user core Feb 9 07:33:15.574277 systemd[1]: sshd@123-139.178.90.101:22-147.75.109.163:45242.service: Deactivated successfully. Feb 9 07:33:15.574764 systemd[1]: session-102.scope: Deactivated successfully. Feb 9 07:33:15.575101 systemd-logind[1462]: Session 102 logged out. Waiting for processes to exit. Feb 9 07:33:15.575491 systemd-logind[1462]: Removed session 102. Feb 9 07:33:15.650997 kernel: audit: type=1101 audit(1707463995.467:2678): pid=13755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:15.651037 kernel: audit: type=1103 audit(1707463995.470:2679): pid=13755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:15.651056 kernel: audit: type=1006 audit(1707463995.470:2680): pid=13755 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=102 res=1 Feb 9 07:33:15.709759 kernel: audit: type=1300 audit(1707463995.470:2680): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe211a7bf0 a2=3 a3=0 items=0 ppid=1 pid=13755 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=102 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:15.470000 audit[13755]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe211a7bf0 a2=3 a3=0 items=0 ppid=1 pid=13755 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=102 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:15.470000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:15.832479 kernel: audit: type=1327 audit(1707463995.470:2680): proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:15.832547 kernel: audit: type=1105 audit(1707463995.493:2681): pid=13755 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:15.493000 audit[13755]: USER_START pid=13755 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:15.927091 kernel: audit: type=1103 audit(1707463995.495:2682): pid=13757 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:15.495000 audit[13757]: CRED_ACQ pid=13757 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:15.573000 audit[13755]: USER_END pid=13755 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:16.112060 kernel: audit: type=1106 audit(1707463995.573:2683): pid=13755 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:16.112097 kernel: audit: type=1104 audit(1707463995.573:2684): pid=13755 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:15.573000 audit[13755]: CRED_DISP pid=13755 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:15.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.101:22-147.75.109.163:45242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:15.889000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:33:15.889000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001fff0c0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:33:15.889000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:33:16.077000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:33:16.077000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001cd1ae0 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:33:16.077000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:33:19.899000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:33:19.899000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ea98a0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:33:19.899000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:33:19.899000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:33:19.899000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00165ba70 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:33:19.899000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:33:19.948000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:33:19.948000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c014b1bf20 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:33:19.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:33:19.948000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:33:19.948000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c004c52c60 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:33:19.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:33:19.949000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:33:19.949000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c004c52cc0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:33:19.949000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:33:19.949000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:33:19.949000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c008f499e0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:33:19.949000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:33:19.949000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:33:19.949000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c014b1bf40 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:33:19.949000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:33:19.986000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:33:19.986000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c004c52ed0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:33:19.986000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:33:20.582661 systemd[1]: Started sshd@124-139.178.90.101:22-147.75.109.163:45248.service. Feb 9 07:33:20.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.101:22-147.75.109.163:45248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:20.609766 kernel: kauditd_printk_skb: 31 callbacks suppressed Feb 9 07:33:20.609835 kernel: audit: type=1130 audit(1707464000.582:2696): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.101:22-147.75.109.163:45248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:20.722000 audit[13806]: USER_ACCT pid=13806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:20.723635 sshd[13806]: Accepted publickey for core from 147.75.109.163 port 45248 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:33:20.724808 sshd[13806]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:33:20.727239 systemd-logind[1462]: New session 103 of user core. Feb 9 07:33:20.727835 systemd[1]: Started session-103.scope. Feb 9 07:33:20.806795 sshd[13806]: pam_unix(sshd:session): session closed for user core Feb 9 07:33:20.808289 systemd[1]: sshd@124-139.178.90.101:22-147.75.109.163:45248.service: Deactivated successfully. Feb 9 07:33:20.808771 systemd[1]: session-103.scope: Deactivated successfully. Feb 9 07:33:20.809097 systemd-logind[1462]: Session 103 logged out. Waiting for processes to exit. Feb 9 07:33:20.809440 systemd-logind[1462]: Removed session 103. Feb 9 07:33:20.724000 audit[13806]: CRED_ACQ pid=13806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:20.905718 kernel: audit: type=1101 audit(1707464000.722:2697): pid=13806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:20.905757 kernel: audit: type=1103 audit(1707464000.724:2698): pid=13806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:20.905775 kernel: audit: type=1006 audit(1707464000.724:2699): pid=13806 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=103 res=1 Feb 9 07:33:20.964527 kernel: audit: type=1300 audit(1707464000.724:2699): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff21e41b40 a2=3 a3=0 items=0 ppid=1 pid=13806 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=103 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:20.724000 audit[13806]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff21e41b40 a2=3 a3=0 items=0 ppid=1 pid=13806 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=103 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:21.056683 kernel: audit: type=1327 audit(1707464000.724:2699): proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:20.724000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:21.087183 kernel: audit: type=1105 audit(1707464000.729:2700): pid=13806 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:20.729000 audit[13806]: USER_START pid=13806 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:21.181939 kernel: audit: type=1103 audit(1707464000.730:2701): pid=13808 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:20.730000 audit[13808]: CRED_ACQ pid=13808 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:21.271327 kernel: audit: type=1106 audit(1707464000.807:2702): pid=13806 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:20.807000 audit[13806]: USER_END pid=13806 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:21.367026 kernel: audit: type=1104 audit(1707464000.807:2703): pid=13806 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:20.807000 audit[13806]: CRED_DISP pid=13806 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:20.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.101:22-147.75.109.163:45248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:24.040000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:33:24.040000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:33:24.040000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017a1780 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:33:24.040000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ea9a80 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:33:24.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:33:24.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:33:24.040000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:33:24.040000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ea9aa0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:33:24.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:33:24.041000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:33:24.041000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e6b420 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:33:24.041000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:33:25.816582 systemd[1]: Started sshd@125-139.178.90.101:22-147.75.109.163:43704.service. Feb 9 07:33:25.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.101:22-147.75.109.163:43704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:25.843691 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 07:33:25.843779 kernel: audit: type=1130 audit(1707464005.816:2709): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.101:22-147.75.109.163:43704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:25.956000 audit[13871]: USER_ACCT pid=13871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:25.957081 sshd[13871]: Accepted publickey for core from 147.75.109.163 port 43704 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:33:25.958794 sshd[13871]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:33:25.961189 systemd-logind[1462]: New session 104 of user core. Feb 9 07:33:25.961676 systemd[1]: Started session-104.scope. Feb 9 07:33:26.039092 sshd[13871]: pam_unix(sshd:session): session closed for user core Feb 9 07:33:26.040571 systemd[1]: sshd@125-139.178.90.101:22-147.75.109.163:43704.service: Deactivated successfully. Feb 9 07:33:26.041005 systemd[1]: session-104.scope: Deactivated successfully. Feb 9 07:33:26.041342 systemd-logind[1462]: Session 104 logged out. Waiting for processes to exit. Feb 9 07:33:26.041895 systemd-logind[1462]: Removed session 104. Feb 9 07:33:25.958000 audit[13871]: CRED_ACQ pid=13871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:26.139060 kernel: audit: type=1101 audit(1707464005.956:2710): pid=13871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:26.139101 kernel: audit: type=1103 audit(1707464005.958:2711): pid=13871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:26.139119 kernel: audit: type=1006 audit(1707464005.958:2712): pid=13871 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=104 res=1 Feb 9 07:33:26.197878 kernel: audit: type=1300 audit(1707464005.958:2712): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1b24adb0 a2=3 a3=0 items=0 ppid=1 pid=13871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=104 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:25.958000 audit[13871]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1b24adb0 a2=3 a3=0 items=0 ppid=1 pid=13871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=104 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:25.958000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:26.320575 kernel: audit: type=1327 audit(1707464005.958:2712): proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:26.320607 kernel: audit: type=1105 audit(1707464005.963:2713): pid=13871 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:25.963000 audit[13871]: USER_START pid=13871 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:26.415175 kernel: audit: type=1103 audit(1707464005.963:2714): pid=13873 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:25.963000 audit[13873]: CRED_ACQ pid=13873 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:26.504569 kernel: audit: type=1106 audit(1707464006.039:2715): pid=13871 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:26.039000 audit[13871]: USER_END pid=13871 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:26.600324 kernel: audit: type=1104 audit(1707464006.039:2716): pid=13871 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:26.039000 audit[13871]: CRED_DISP pid=13871 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:26.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.101:22-147.75.109.163:43704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:31.050928 systemd[1]: Started sshd@126-139.178.90.101:22-147.75.109.163:43714.service. Feb 9 07:33:31.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.90.101:22-147.75.109.163:43714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:31.078434 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:33:31.078473 kernel: audit: type=1130 audit(1707464011.050:2718): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.90.101:22-147.75.109.163:43714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:31.191000 audit[13898]: USER_ACCT pid=13898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:31.191720 sshd[13898]: Accepted publickey for core from 147.75.109.163 port 43714 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:33:31.192461 sshd[13898]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:33:31.195040 systemd-logind[1462]: New session 105 of user core. Feb 9 07:33:31.195525 systemd[1]: Started session-105.scope. Feb 9 07:33:31.272935 sshd[13898]: pam_unix(sshd:session): session closed for user core Feb 9 07:33:31.274298 systemd[1]: sshd@126-139.178.90.101:22-147.75.109.163:43714.service: Deactivated successfully. Feb 9 07:33:31.274762 systemd[1]: session-105.scope: Deactivated successfully. Feb 9 07:33:31.275177 systemd-logind[1462]: Session 105 logged out. Waiting for processes to exit. Feb 9 07:33:31.275670 systemd-logind[1462]: Removed session 105. Feb 9 07:33:31.191000 audit[13898]: CRED_ACQ pid=13898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:31.373716 kernel: audit: type=1101 audit(1707464011.191:2719): pid=13898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:31.373756 kernel: audit: type=1103 audit(1707464011.191:2720): pid=13898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:31.373779 kernel: audit: type=1006 audit(1707464011.191:2721): pid=13898 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=105 res=1 Feb 9 07:33:31.432532 kernel: audit: type=1300 audit(1707464011.191:2721): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd0c79b20 a2=3 a3=0 items=0 ppid=1 pid=13898 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=105 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:31.191000 audit[13898]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd0c79b20 a2=3 a3=0 items=0 ppid=1 pid=13898 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=105 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:31.524664 kernel: audit: type=1327 audit(1707464011.191:2721): proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:31.191000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:31.555165 kernel: audit: type=1105 audit(1707464011.197:2722): pid=13898 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:31.197000 audit[13898]: USER_START pid=13898 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:31.649737 kernel: audit: type=1103 audit(1707464011.197:2723): pid=13901 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:31.197000 audit[13901]: CRED_ACQ pid=13901 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:31.739037 kernel: audit: type=1106 audit(1707464011.273:2724): pid=13898 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:31.273000 audit[13898]: USER_END pid=13898 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:31.834750 kernel: audit: type=1104 audit(1707464011.273:2725): pid=13898 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:31.273000 audit[13898]: CRED_DISP pid=13898 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:31.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.90.101:22-147.75.109.163:43714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:36.286153 systemd[1]: Started sshd@127-139.178.90.101:22-147.75.109.163:34546.service. Feb 9 07:33:36.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.90.101:22-147.75.109.163:34546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:36.313822 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:33:36.313898 kernel: audit: type=1130 audit(1707464016.285:2727): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.90.101:22-147.75.109.163:34546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:36.424000 audit[13964]: USER_ACCT pid=13964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:36.425677 sshd[13964]: Accepted publickey for core from 147.75.109.163 port 34546 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:33:36.426802 sshd[13964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:33:36.429164 systemd-logind[1462]: New session 106 of user core. Feb 9 07:33:36.429691 systemd[1]: Started session-106.scope. Feb 9 07:33:36.508096 sshd[13964]: pam_unix(sshd:session): session closed for user core Feb 9 07:33:36.509311 systemd[1]: sshd@127-139.178.90.101:22-147.75.109.163:34546.service: Deactivated successfully. Feb 9 07:33:36.509768 systemd[1]: session-106.scope: Deactivated successfully. Feb 9 07:33:36.510186 systemd-logind[1462]: Session 106 logged out. Waiting for processes to exit. Feb 9 07:33:36.510677 systemd-logind[1462]: Removed session 106. Feb 9 07:33:36.425000 audit[13964]: CRED_ACQ pid=13964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:36.607661 kernel: audit: type=1101 audit(1707464016.424:2728): pid=13964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:36.607704 kernel: audit: type=1103 audit(1707464016.425:2729): pid=13964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:36.607721 kernel: audit: type=1006 audit(1707464016.425:2730): pid=13964 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=106 res=1 Feb 9 07:33:36.666407 kernel: audit: type=1300 audit(1707464016.425:2730): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc231aee70 a2=3 a3=0 items=0 ppid=1 pid=13964 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=106 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:36.425000 audit[13964]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc231aee70 a2=3 a3=0 items=0 ppid=1 pid=13964 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=106 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:36.758508 kernel: audit: type=1327 audit(1707464016.425:2730): proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:36.425000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:36.788994 kernel: audit: type=1105 audit(1707464016.430:2731): pid=13964 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:36.430000 audit[13964]: USER_START pid=13964 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:36.883628 kernel: audit: type=1103 audit(1707464016.430:2732): pid=13966 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:36.430000 audit[13966]: CRED_ACQ pid=13966 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:36.954190 systemd[1]: Started sshd@128-139.178.90.101:22-74.121.149.150:55588.service. Feb 9 07:33:36.507000 audit[13964]: USER_END pid=13964 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:37.068558 kernel: audit: type=1106 audit(1707464016.507:2733): pid=13964 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:37.068592 kernel: audit: type=1104 audit(1707464016.507:2734): pid=13964 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:36.507000 audit[13964]: CRED_DISP pid=13964 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:36.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.90.101:22-147.75.109.163:34546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:36.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.90.101:22-74.121.149.150:55588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:40.262141 sshd[13988]: Invalid user config from 74.121.149.150 port 55588 Feb 9 07:33:40.268282 sshd[13988]: pam_faillock(sshd:auth): User unknown Feb 9 07:33:40.269394 sshd[13988]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:33:40.269485 sshd[13988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.121.149.150 Feb 9 07:33:40.270417 sshd[13988]: pam_faillock(sshd:auth): User unknown Feb 9 07:33:40.269000 audit[13988]: USER_AUTH pid=13988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="config" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 07:33:41.519691 systemd[1]: Started sshd@129-139.178.90.101:22-147.75.109.163:34556.service. Feb 9 07:33:41.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.90.101:22-147.75.109.163:34556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:41.547271 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 07:33:41.547332 kernel: audit: type=1130 audit(1707464021.518:2738): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.90.101:22-147.75.109.163:34556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:41.570225 sshd[13993]: Accepted publickey for core from 147.75.109.163 port 34556 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:33:41.572037 sshd[13993]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:33:41.574476 systemd-logind[1462]: New session 107 of user core. Feb 9 07:33:41.575186 systemd[1]: Started session-107.scope. Feb 9 07:33:41.568000 audit[13993]: USER_ACCT pid=13993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:41.655373 sshd[13993]: pam_unix(sshd:session): session closed for user core Feb 9 07:33:41.656715 systemd[1]: sshd@129-139.178.90.101:22-147.75.109.163:34556.service: Deactivated successfully. Feb 9 07:33:41.657145 systemd[1]: session-107.scope: Deactivated successfully. Feb 9 07:33:41.657423 systemd-logind[1462]: Session 107 logged out. Waiting for processes to exit. Feb 9 07:33:41.658044 systemd-logind[1462]: Removed session 107. Feb 9 07:33:41.728946 kernel: audit: type=1101 audit(1707464021.568:2739): pid=13993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:41.728986 kernel: audit: type=1103 audit(1707464021.570:2740): pid=13993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:41.570000 audit[13993]: CRED_ACQ pid=13993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:41.819576 kernel: audit: type=1006 audit(1707464021.570:2741): pid=13993 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=107 res=1 Feb 9 07:33:41.877655 sshd[13988]: Failed password for invalid user config from 74.121.149.150 port 55588 ssh2 Feb 9 07:33:41.570000 audit[13993]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe2d0ee40 a2=3 a3=0 items=0 ppid=1 pid=13993 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=107 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:41.970507 kernel: audit: type=1300 audit(1707464021.570:2741): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe2d0ee40 a2=3 a3=0 items=0 ppid=1 pid=13993 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=107 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:41.970542 kernel: audit: type=1327 audit(1707464021.570:2741): proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:41.570000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:41.575000 audit[13993]: USER_START pid=13993 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:42.001569 kernel: audit: type=1105 audit(1707464021.575:2742): pid=13993 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:41.576000 audit[13995]: CRED_ACQ pid=13995 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:42.184981 kernel: audit: type=1103 audit(1707464021.576:2743): pid=13995 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:42.185019 kernel: audit: type=1106 audit(1707464021.654:2744): pid=13993 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:41.654000 audit[13993]: USER_END pid=13993 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:41.654000 audit[13993]: CRED_DISP pid=13993 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:42.370078 kernel: audit: type=1104 audit(1707464021.654:2745): pid=13993 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:41.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.90.101:22-147.75.109.163:34556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:43.256531 sshd[13988]: Received disconnect from 74.121.149.150 port 55588:11: Bye Bye [preauth] Feb 9 07:33:43.256531 sshd[13988]: Disconnected from invalid user config 74.121.149.150 port 55588 [preauth] Feb 9 07:33:43.259140 systemd[1]: sshd@128-139.178.90.101:22-74.121.149.150:55588.service: Deactivated successfully. Feb 9 07:33:43.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.90.101:22-74.121.149.150:55588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:46.665282 systemd[1]: Started sshd@130-139.178.90.101:22-147.75.109.163:51170.service. Feb 9 07:33:46.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.90.101:22-147.75.109.163:51170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:46.692339 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 07:33:46.692383 kernel: audit: type=1130 audit(1707464026.663:2748): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.90.101:22-147.75.109.163:51170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:46.805240 sshd[14022]: Accepted publickey for core from 147.75.109.163 port 51170 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:33:46.803000 audit[14022]: USER_ACCT pid=14022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:46.808804 sshd[14022]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:33:46.811172 systemd-logind[1462]: New session 108 of user core. Feb 9 07:33:46.811615 systemd[1]: Started session-108.scope. Feb 9 07:33:46.892208 sshd[14022]: pam_unix(sshd:session): session closed for user core Feb 9 07:33:46.893516 systemd[1]: sshd@130-139.178.90.101:22-147.75.109.163:51170.service: Deactivated successfully. Feb 9 07:33:46.893992 systemd[1]: session-108.scope: Deactivated successfully. Feb 9 07:33:46.894348 systemd-logind[1462]: Session 108 logged out. Waiting for processes to exit. Feb 9 07:33:46.894899 systemd-logind[1462]: Removed session 108. Feb 9 07:33:46.807000 audit[14022]: CRED_ACQ pid=14022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:46.987446 kernel: audit: type=1101 audit(1707464026.803:2749): pid=14022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:46.987491 kernel: audit: type=1103 audit(1707464026.807:2750): pid=14022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:46.987514 kernel: audit: type=1006 audit(1707464026.807:2751): pid=14022 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=108 res=1 Feb 9 07:33:47.046243 kernel: audit: type=1300 audit(1707464026.807:2751): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8264ca30 a2=3 a3=0 items=0 ppid=1 pid=14022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=108 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:46.807000 audit[14022]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8264ca30 a2=3 a3=0 items=0 ppid=1 pid=14022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=108 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:47.138416 kernel: audit: type=1327 audit(1707464026.807:2751): proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:46.807000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:47.168940 kernel: audit: type=1105 audit(1707464026.812:2752): pid=14022 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:46.812000 audit[14022]: USER_START pid=14022 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:46.812000 audit[14024]: CRED_ACQ pid=14024 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:47.353023 kernel: audit: type=1103 audit(1707464026.812:2753): pid=14024 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:47.353058 kernel: audit: type=1106 audit(1707464026.891:2754): pid=14022 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:46.891000 audit[14022]: USER_END pid=14022 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:47.448710 kernel: audit: type=1104 audit(1707464026.891:2755): pid=14022 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:46.891000 audit[14022]: CRED_DISP pid=14022 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:46.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.90.101:22-147.75.109.163:51170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:51.905303 systemd[1]: Started sshd@131-139.178.90.101:22-147.75.109.163:51182.service. Feb 9 07:33:51.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.90.101:22-147.75.109.163:51182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:51.932970 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:33:51.933070 kernel: audit: type=1130 audit(1707464031.904:2757): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.90.101:22-147.75.109.163:51182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:52.045000 audit[14073]: USER_ACCT pid=14073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:52.046917 sshd[14073]: Accepted publickey for core from 147.75.109.163 port 51182 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:33:52.047799 sshd[14073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:33:52.050091 systemd-logind[1462]: New session 109 of user core. Feb 9 07:33:52.050799 systemd[1]: Started session-109.scope. Feb 9 07:33:52.131489 sshd[14073]: pam_unix(sshd:session): session closed for user core Feb 9 07:33:52.132963 systemd[1]: sshd@131-139.178.90.101:22-147.75.109.163:51182.service: Deactivated successfully. Feb 9 07:33:52.133436 systemd[1]: session-109.scope: Deactivated successfully. Feb 9 07:33:52.133773 systemd-logind[1462]: Session 109 logged out. Waiting for processes to exit. Feb 9 07:33:52.134188 systemd-logind[1462]: Removed session 109. Feb 9 07:33:52.046000 audit[14073]: CRED_ACQ pid=14073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:52.228943 kernel: audit: type=1101 audit(1707464032.045:2758): pid=14073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:52.228994 kernel: audit: type=1103 audit(1707464032.046:2759): pid=14073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:52.229014 kernel: audit: type=1006 audit(1707464032.046:2760): pid=14073 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=109 res=1 Feb 9 07:33:52.287773 kernel: audit: type=1300 audit(1707464032.046:2760): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb33b5fa0 a2=3 a3=0 items=0 ppid=1 pid=14073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=109 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:52.046000 audit[14073]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb33b5fa0 a2=3 a3=0 items=0 ppid=1 pid=14073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=109 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:52.046000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:52.410576 kernel: audit: type=1327 audit(1707464032.046:2760): proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:52.410612 kernel: audit: type=1105 audit(1707464032.051:2761): pid=14073 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:52.051000 audit[14073]: USER_START pid=14073 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:52.505217 kernel: audit: type=1103 audit(1707464032.052:2762): pid=14075 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:52.052000 audit[14075]: CRED_ACQ pid=14075 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:52.130000 audit[14073]: USER_END pid=14073 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:52.690298 kernel: audit: type=1106 audit(1707464032.130:2763): pid=14073 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:52.690334 kernel: audit: type=1104 audit(1707464032.130:2764): pid=14073 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:52.130000 audit[14073]: CRED_DISP pid=14073 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:52.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.90.101:22-147.75.109.163:51182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:57.145096 systemd[1]: Started sshd@132-139.178.90.101:22-147.75.109.163:49526.service. Feb 9 07:33:57.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.90.101:22-147.75.109.163:49526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:57.172775 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:33:57.172883 kernel: audit: type=1130 audit(1707464037.144:2766): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.90.101:22-147.75.109.163:49526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:33:57.285000 audit[14137]: USER_ACCT pid=14137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:57.286690 sshd[14137]: Accepted publickey for core from 147.75.109.163 port 49526 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:33:57.287808 sshd[14137]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:33:57.290188 systemd-logind[1462]: New session 110 of user core. Feb 9 07:33:57.290920 systemd[1]: Started session-110.scope. Feb 9 07:33:57.372645 sshd[14137]: pam_unix(sshd:session): session closed for user core Feb 9 07:33:57.374139 systemd[1]: sshd@132-139.178.90.101:22-147.75.109.163:49526.service: Deactivated successfully. Feb 9 07:33:57.374620 systemd[1]: session-110.scope: Deactivated successfully. Feb 9 07:33:57.374949 systemd-logind[1462]: Session 110 logged out. Waiting for processes to exit. Feb 9 07:33:57.375338 systemd-logind[1462]: Removed session 110. Feb 9 07:33:57.286000 audit[14137]: CRED_ACQ pid=14137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:57.468712 kernel: audit: type=1101 audit(1707464037.285:2767): pid=14137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:57.468754 kernel: audit: type=1103 audit(1707464037.286:2768): pid=14137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:57.468775 kernel: audit: type=1006 audit(1707464037.286:2769): pid=14137 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=110 res=1 Feb 9 07:33:57.527503 kernel: audit: type=1300 audit(1707464037.286:2769): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde68af610 a2=3 a3=0 items=0 ppid=1 pid=14137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=110 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:57.286000 audit[14137]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde68af610 a2=3 a3=0 items=0 ppid=1 pid=14137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=110 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:33:57.619701 kernel: audit: type=1327 audit(1707464037.286:2769): proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:57.286000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:33:57.291000 audit[14137]: USER_START pid=14137 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:57.744867 kernel: audit: type=1105 audit(1707464037.291:2770): pid=14137 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:57.744902 kernel: audit: type=1103 audit(1707464037.292:2771): pid=14139 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:57.292000 audit[14139]: CRED_ACQ pid=14139 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:57.834217 kernel: audit: type=1106 audit(1707464037.371:2772): pid=14137 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:57.371000 audit[14137]: USER_END pid=14137 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:57.929991 kernel: audit: type=1104 audit(1707464037.372:2773): pid=14137 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:57.372000 audit[14137]: CRED_DISP pid=14137 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:33:57.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.90.101:22-147.75.109.163:49526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:02.382422 systemd[1]: Started sshd@133-139.178.90.101:22-147.75.109.163:49536.service. Feb 9 07:34:02.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.90.101:22-147.75.109.163:49536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:02.409537 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:34:02.409573 kernel: audit: type=1130 audit(1707464042.381:2775): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.90.101:22-147.75.109.163:49536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:02.521000 audit[14177]: USER_ACCT pid=14177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:02.523166 sshd[14177]: Accepted publickey for core from 147.75.109.163 port 49536 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:34:02.524461 sshd[14177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:34:02.526860 systemd-logind[1462]: New session 111 of user core. Feb 9 07:34:02.527596 systemd[1]: Started session-111.scope. Feb 9 07:34:02.609247 sshd[14177]: pam_unix(sshd:session): session closed for user core Feb 9 07:34:02.610689 systemd[1]: sshd@133-139.178.90.101:22-147.75.109.163:49536.service: Deactivated successfully. Feb 9 07:34:02.611133 systemd[1]: session-111.scope: Deactivated successfully. Feb 9 07:34:02.611438 systemd-logind[1462]: Session 111 logged out. Waiting for processes to exit. Feb 9 07:34:02.612246 systemd-logind[1462]: Removed session 111. Feb 9 07:34:02.522000 audit[14177]: CRED_ACQ pid=14177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:02.705567 kernel: audit: type=1101 audit(1707464042.521:2776): pid=14177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:02.705605 kernel: audit: type=1103 audit(1707464042.522:2777): pid=14177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:02.705623 kernel: audit: type=1006 audit(1707464042.522:2778): pid=14177 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=111 res=1 Feb 9 07:34:02.522000 audit[14177]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4e775470 a2=3 a3=0 items=0 ppid=1 pid=14177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=111 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:02.856675 kernel: audit: type=1300 audit(1707464042.522:2778): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4e775470 a2=3 a3=0 items=0 ppid=1 pid=14177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=111 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:02.856709 kernel: audit: type=1327 audit(1707464042.522:2778): proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:02.522000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:02.887211 kernel: audit: type=1105 audit(1707464042.528:2779): pid=14177 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:02.528000 audit[14177]: USER_START pid=14177 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:02.981858 kernel: audit: type=1103 audit(1707464042.529:2780): pid=14179 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:02.529000 audit[14179]: CRED_ACQ pid=14179 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:03.071226 kernel: audit: type=1106 audit(1707464042.608:2781): pid=14177 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:02.608000 audit[14177]: USER_END pid=14177 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:02.608000 audit[14177]: CRED_DISP pid=14177 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:03.256400 kernel: audit: type=1104 audit(1707464042.608:2782): pid=14177 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:02.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.90.101:22-147.75.109.163:49536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:07.619633 systemd[1]: Started sshd@134-139.178.90.101:22-147.75.109.163:59772.service. Feb 9 07:34:07.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.90.101:22-147.75.109.163:59772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:07.646630 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:34:07.646706 kernel: audit: type=1130 audit(1707464047.618:2784): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.90.101:22-147.75.109.163:59772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:07.758000 audit[14221]: USER_ACCT pid=14221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:07.759934 sshd[14221]: Accepted publickey for core from 147.75.109.163 port 59772 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:34:07.760791 sshd[14221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:34:07.763213 systemd-logind[1462]: New session 112 of user core. Feb 9 07:34:07.763678 systemd[1]: Started session-112.scope. Feb 9 07:34:07.759000 audit[14221]: CRED_ACQ pid=14221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:07.942073 kernel: audit: type=1101 audit(1707464047.758:2785): pid=14221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:07.942110 kernel: audit: type=1103 audit(1707464047.759:2786): pid=14221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:07.942127 kernel: audit: type=1006 audit(1707464047.759:2787): pid=14221 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=112 res=1 Feb 9 07:34:07.759000 audit[14221]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec279cb60 a2=3 a3=0 items=0 ppid=1 pid=14221 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=112 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:08.093081 kernel: audit: type=1300 audit(1707464047.759:2787): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec279cb60 a2=3 a3=0 items=0 ppid=1 pid=14221 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=112 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:08.093157 kernel: audit: type=1327 audit(1707464047.759:2787): proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:07.759000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:08.093341 sshd[14221]: pam_unix(sshd:session): session closed for user core Feb 9 07:34:08.094743 systemd[1]: sshd@134-139.178.90.101:22-147.75.109.163:59772.service: Deactivated successfully. Feb 9 07:34:08.095238 systemd[1]: session-112.scope: Deactivated successfully. Feb 9 07:34:08.095608 systemd-logind[1462]: Session 112 logged out. Waiting for processes to exit. Feb 9 07:34:08.095977 systemd-logind[1462]: Removed session 112. Feb 9 07:34:07.764000 audit[14221]: USER_START pid=14221 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:08.218242 kernel: audit: type=1105 audit(1707464047.764:2788): pid=14221 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:08.218279 kernel: audit: type=1103 audit(1707464047.764:2789): pid=14223 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:07.764000 audit[14223]: CRED_ACQ pid=14223 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:08.092000 audit[14221]: USER_END pid=14221 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:08.403304 kernel: audit: type=1106 audit(1707464048.092:2790): pid=14221 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:08.403347 kernel: audit: type=1104 audit(1707464048.092:2791): pid=14221 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:08.092000 audit[14221]: CRED_DISP pid=14221 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:08.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.90.101:22-147.75.109.163:59772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:13.043945 systemd[1]: Started sshd@135-139.178.90.101:22-147.75.109.163:59782.service. Feb 9 07:34:13.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.90.101:22-147.75.109.163:59782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:13.071046 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:34:13.071140 kernel: audit: type=1130 audit(1707464053.042:2793): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.90.101:22-147.75.109.163:59782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:13.182000 audit[14248]: USER_ACCT pid=14248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:13.184435 sshd[14248]: Accepted publickey for core from 147.75.109.163 port 59782 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:34:13.185765 sshd[14248]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:34:13.188088 systemd-logind[1462]: New session 113 of user core. Feb 9 07:34:13.188771 systemd[1]: Started session-113.scope. Feb 9 07:34:13.266699 sshd[14248]: pam_unix(sshd:session): session closed for user core Feb 9 07:34:13.267982 systemd[1]: sshd@135-139.178.90.101:22-147.75.109.163:59782.service: Deactivated successfully. Feb 9 07:34:13.268425 systemd[1]: session-113.scope: Deactivated successfully. Feb 9 07:34:13.268871 systemd-logind[1462]: Session 113 logged out. Waiting for processes to exit. Feb 9 07:34:13.269359 systemd-logind[1462]: Removed session 113. Feb 9 07:34:13.184000 audit[14248]: CRED_ACQ pid=14248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:13.366577 kernel: audit: type=1101 audit(1707464053.182:2794): pid=14248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:13.366620 kernel: audit: type=1103 audit(1707464053.184:2795): pid=14248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:13.366638 kernel: audit: type=1006 audit(1707464053.184:2796): pid=14248 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=113 res=1 Feb 9 07:34:13.425416 kernel: audit: type=1300 audit(1707464053.184:2796): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb41efb80 a2=3 a3=0 items=0 ppid=1 pid=14248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=113 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:13.184000 audit[14248]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb41efb80 a2=3 a3=0 items=0 ppid=1 pid=14248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=113 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:13.184000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:13.548170 kernel: audit: type=1327 audit(1707464053.184:2796): proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:13.548202 kernel: audit: type=1105 audit(1707464053.189:2797): pid=14248 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:13.189000 audit[14248]: USER_START pid=14248 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:13.642868 kernel: audit: type=1103 audit(1707464053.190:2798): pid=14250 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:13.190000 audit[14250]: CRED_ACQ pid=14250 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:13.265000 audit[14248]: USER_END pid=14248 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:13.827925 kernel: audit: type=1106 audit(1707464053.265:2799): pid=14248 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:13.827980 kernel: audit: type=1104 audit(1707464053.265:2800): pid=14248 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:13.265000 audit[14248]: CRED_DISP pid=14248 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:13.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.90.101:22-147.75.109.163:59782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:15.890000 audit[6142]: AVC avc: denied { watch } for pid=6142 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.4270793498/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c944 tclass=file permissive=0 Feb 9 07:34:15.890000 audit[6142]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00221d5e0 a2=fc6 a3=0 items=0 ppid=5203 pid=6142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c944 key=(null) Feb 9 07:34:15.890000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:34:16.077000 audit[6172]: AVC avc: denied { watch } for pid=6172 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_07_06_23.3136559680/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c506 tclass=file permissive=0 Feb 9 07:34:16.077000 audit[6172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001cd08a0 a2=fc6 a3=0 items=0 ppid=5252 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c506 key=(null) Feb 9 07:34:16.077000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 07:34:18.276383 systemd[1]: Started sshd@136-139.178.90.101:22-147.75.109.163:59534.service. Feb 9 07:34:18.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.90.101:22-147.75.109.163:59534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:18.303418 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 07:34:18.303463 kernel: audit: type=1130 audit(1707464058.274:2804): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.90.101:22-147.75.109.163:59534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:18.416550 sshd[14274]: Accepted publickey for core from 147.75.109.163 port 59534 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:34:18.414000 audit[14274]: USER_ACCT pid=14274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:18.418210 sshd[14274]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:34:18.420487 systemd-logind[1462]: New session 114 of user core. Feb 9 07:34:18.421007 systemd[1]: Started session-114.scope. Feb 9 07:34:18.498870 sshd[14274]: pam_unix(sshd:session): session closed for user core Feb 9 07:34:18.500252 systemd[1]: sshd@136-139.178.90.101:22-147.75.109.163:59534.service: Deactivated successfully. Feb 9 07:34:18.500727 systemd[1]: session-114.scope: Deactivated successfully. Feb 9 07:34:18.501094 systemd-logind[1462]: Session 114 logged out. Waiting for processes to exit. Feb 9 07:34:18.501484 systemd-logind[1462]: Removed session 114. Feb 9 07:34:18.416000 audit[14274]: CRED_ACQ pid=14274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:18.598773 kernel: audit: type=1101 audit(1707464058.414:2805): pid=14274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:18.598811 kernel: audit: type=1103 audit(1707464058.416:2806): pid=14274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:18.598831 kernel: audit: type=1006 audit(1707464058.416:2807): pid=14274 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=114 res=1 Feb 9 07:34:18.657579 kernel: audit: type=1300 audit(1707464058.416:2807): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc533be50 a2=3 a3=0 items=0 ppid=1 pid=14274 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=114 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:18.416000 audit[14274]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc533be50 a2=3 a3=0 items=0 ppid=1 pid=14274 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=114 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:18.749802 kernel: audit: type=1327 audit(1707464058.416:2807): proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:18.416000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:18.780402 kernel: audit: type=1105 audit(1707464058.421:2808): pid=14274 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:18.421000 audit[14274]: USER_START pid=14274 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:18.875135 kernel: audit: type=1103 audit(1707464058.422:2809): pid=14276 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:18.422000 audit[14276]: CRED_ACQ pid=14276 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:18.497000 audit[14274]: USER_END pid=14274 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:19.060149 kernel: audit: type=1106 audit(1707464058.497:2810): pid=14274 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:19.060184 kernel: audit: type=1104 audit(1707464058.498:2811): pid=14274 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:18.498000 audit[14274]: CRED_DISP pid=14274 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:18.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.90.101:22-147.75.109.163:59534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:19.899000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:34:19.899000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001151dc0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:34:19.899000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:34:19.899000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:34:19.899000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011dcde0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:34:19.899000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:34:19.948000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:34:19.948000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c006da40c0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:34:19.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:34:19.948000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:34:19.948000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c010b4fca0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:34:19.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:34:19.948000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:34:19.948000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0150534a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:34:19.948000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:34:19.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:34:19.948000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:34:19.948000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c006da4180 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:34:19.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:34:19.948000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c006e28400 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:34:19.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:34:19.986000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:34:19.986000 audit[2361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0146807e0 a2=fc6 a3=0 items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c433,c1023 key=(null) Feb 9 07:34:19.986000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 07:34:23.508867 systemd[1]: Started sshd@137-139.178.90.101:22-147.75.109.163:59546.service. Feb 9 07:34:23.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.90.101:22-147.75.109.163:59546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:23.536054 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 07:34:23.536135 kernel: audit: type=1130 audit(1707464063.507:2821): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.90.101:22-147.75.109.163:59546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:23.647000 audit[14325]: USER_ACCT pid=14325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:23.649670 sshd[14325]: Accepted publickey for core from 147.75.109.163 port 59546 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:34:23.650777 sshd[14325]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:34:23.653066 systemd-logind[1462]: New session 115 of user core. Feb 9 07:34:23.653811 systemd[1]: Started session-115.scope. Feb 9 07:34:23.731679 sshd[14325]: pam_unix(sshd:session): session closed for user core Feb 9 07:34:23.733024 systemd[1]: sshd@137-139.178.90.101:22-147.75.109.163:59546.service: Deactivated successfully. Feb 9 07:34:23.733462 systemd[1]: session-115.scope: Deactivated successfully. Feb 9 07:34:23.733862 systemd-logind[1462]: Session 115 logged out. Waiting for processes to exit. Feb 9 07:34:23.734313 systemd-logind[1462]: Removed session 115. Feb 9 07:34:23.649000 audit[14325]: CRED_ACQ pid=14325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:23.831733 kernel: audit: type=1101 audit(1707464063.647:2822): pid=14325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:23.831786 kernel: audit: type=1103 audit(1707464063.649:2823): pid=14325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:23.831804 kernel: audit: type=1006 audit(1707464063.649:2824): pid=14325 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=115 res=1 Feb 9 07:34:23.890498 kernel: audit: type=1300 audit(1707464063.649:2824): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb9bd5c90 a2=3 a3=0 items=0 ppid=1 pid=14325 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=115 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:23.649000 audit[14325]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb9bd5c90 a2=3 a3=0 items=0 ppid=1 pid=14325 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=115 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:23.649000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:24.013346 kernel: audit: type=1327 audit(1707464063.649:2824): proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:24.013377 kernel: audit: type=1105 audit(1707464063.654:2825): pid=14325 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:23.654000 audit[14325]: USER_START pid=14325 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:24.107965 kernel: audit: type=1103 audit(1707464063.655:2826): pid=14327 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:23.655000 audit[14327]: CRED_ACQ pid=14327 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:23.730000 audit[14325]: USER_END pid=14325 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:24.293051 kernel: audit: type=1106 audit(1707464063.730:2827): pid=14325 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:24.293126 kernel: audit: type=1104 audit(1707464063.730:2828): pid=14325 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:23.730000 audit[14325]: CRED_DISP pid=14325 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:23.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.90.101:22-147.75.109.163:59546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:24.040000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:34:24.040000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b4f5c0 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:34:24.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:34:24.040000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:34:24.040000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b22400 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:34:24.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:34:24.040000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:34:24.040000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cb3a40 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:34:24.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:34:24.040000 audit[2403]: AVC avc: denied { watch } for pid=2403 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 07:34:24.040000 audit[2403]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc0000 a2=fc6 a3=0 items=0 ppid=2236 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c207 key=(null) Feb 9 07:34:24.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 07:34:28.742869 systemd[1]: Started sshd@138-139.178.90.101:22-147.75.109.163:39306.service. Feb 9 07:34:28.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.90.101:22-147.75.109.163:39306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:28.770114 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 07:34:28.770196 kernel: audit: type=1130 audit(1707464068.741:2834): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.90.101:22-147.75.109.163:39306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:28.883896 sshd[14391]: Accepted publickey for core from 147.75.109.163 port 39306 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:34:28.882000 audit[14391]: USER_ACCT pid=14391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:28.884793 sshd[14391]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:34:28.887502 systemd-logind[1462]: New session 116 of user core. Feb 9 07:34:28.888636 systemd[1]: Started session-116.scope. Feb 9 07:34:28.968780 sshd[14391]: pam_unix(sshd:session): session closed for user core Feb 9 07:34:28.970481 systemd[1]: sshd@138-139.178.90.101:22-147.75.109.163:39306.service: Deactivated successfully. Feb 9 07:34:28.971261 systemd[1]: session-116.scope: Deactivated successfully. Feb 9 07:34:28.971908 systemd-logind[1462]: Session 116 logged out. Waiting for processes to exit. Feb 9 07:34:28.972424 systemd-logind[1462]: Removed session 116. Feb 9 07:34:28.883000 audit[14391]: CRED_ACQ pid=14391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:29.067347 kernel: audit: type=1101 audit(1707464068.882:2835): pid=14391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:29.067389 kernel: audit: type=1103 audit(1707464068.883:2836): pid=14391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:29.067408 kernel: audit: type=1006 audit(1707464068.883:2837): pid=14391 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=116 res=1 Feb 9 07:34:29.126167 kernel: audit: type=1300 audit(1707464068.883:2837): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd669fdbc0 a2=3 a3=0 items=0 ppid=1 pid=14391 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=116 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:28.883000 audit[14391]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd669fdbc0 a2=3 a3=0 items=0 ppid=1 pid=14391 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=116 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:29.218381 kernel: audit: type=1327 audit(1707464068.883:2837): proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:28.883000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:29.248889 kernel: audit: type=1105 audit(1707464068.889:2838): pid=14391 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:28.889000 audit[14391]: USER_START pid=14391 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:28.890000 audit[14394]: CRED_ACQ pid=14394 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:29.433022 kernel: audit: type=1103 audit(1707464068.890:2839): pid=14394 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:29.433061 kernel: audit: type=1106 audit(1707464068.967:2840): pid=14391 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:28.967000 audit[14391]: USER_END pid=14391 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:29.528736 kernel: audit: type=1104 audit(1707464068.968:2841): pid=14391 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:28.968000 audit[14391]: CRED_DISP pid=14391 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:28.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.90.101:22-147.75.109.163:39306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:33.980231 systemd[1]: Started sshd@139-139.178.90.101:22-147.75.109.163:39314.service. Feb 9 07:34:33.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.90.101:22-147.75.109.163:39314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:34.007595 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:34:34.007696 kernel: audit: type=1130 audit(1707464073.979:2843): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.90.101:22-147.75.109.163:39314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:34.119000 audit[14456]: USER_ACCT pid=14456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:34.119953 sshd[14456]: Accepted publickey for core from 147.75.109.163 port 39314 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:34:34.121761 sshd[14456]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:34:34.124574 systemd-logind[1462]: New session 117 of user core. Feb 9 07:34:34.125657 systemd[1]: Started session-117.scope. Feb 9 07:34:34.208884 sshd[14456]: pam_unix(sshd:session): session closed for user core Feb 9 07:34:34.210768 systemd[1]: sshd@139-139.178.90.101:22-147.75.109.163:39314.service: Deactivated successfully. Feb 9 07:34:34.211240 systemd[1]: session-117.scope: Deactivated successfully. Feb 9 07:34:34.211614 systemd-logind[1462]: Session 117 logged out. Waiting for processes to exit. Feb 9 07:34:34.212030 systemd-logind[1462]: Removed session 117. Feb 9 07:34:34.120000 audit[14456]: CRED_ACQ pid=14456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:34.304332 kernel: audit: type=1101 audit(1707464074.119:2844): pid=14456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:34.304370 kernel: audit: type=1103 audit(1707464074.120:2845): pid=14456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:34.304388 kernel: audit: type=1006 audit(1707464074.120:2846): pid=14456 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=117 res=1 Feb 9 07:34:34.363150 kernel: audit: type=1300 audit(1707464074.120:2846): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed06b1150 a2=3 a3=0 items=0 ppid=1 pid=14456 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=117 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:34.120000 audit[14456]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed06b1150 a2=3 a3=0 items=0 ppid=1 pid=14456 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=117 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:34.455343 kernel: audit: type=1327 audit(1707464074.120:2846): proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:34.120000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:34.485900 kernel: audit: type=1105 audit(1707464074.126:2847): pid=14456 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:34.126000 audit[14456]: USER_START pid=14456 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:34.127000 audit[14458]: CRED_ACQ pid=14458 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:34.669954 kernel: audit: type=1103 audit(1707464074.127:2848): pid=14458 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:34.669990 kernel: audit: type=1106 audit(1707464074.208:2849): pid=14456 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:34.208000 audit[14456]: USER_END pid=14456 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:34.208000 audit[14456]: CRED_DISP pid=14456 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:34.855075 kernel: audit: type=1104 audit(1707464074.208:2850): pid=14456 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:34.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.90.101:22-147.75.109.163:39314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:39.221882 systemd[1]: Started sshd@140-139.178.90.101:22-147.75.109.163:47558.service. Feb 9 07:34:39.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.90.101:22-147.75.109.163:47558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:39.249913 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:34:39.249990 kernel: audit: type=1130 audit(1707464079.221:2852): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.90.101:22-147.75.109.163:47558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:39.361594 sshd[14482]: Accepted publickey for core from 147.75.109.163 port 47558 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:34:39.360000 audit[14482]: USER_ACCT pid=14482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:39.362991 sshd[14482]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:34:39.365280 systemd-logind[1462]: New session 118 of user core. Feb 9 07:34:39.365963 systemd[1]: Started session-118.scope. Feb 9 07:34:39.446332 sshd[14482]: pam_unix(sshd:session): session closed for user core Feb 9 07:34:39.447667 systemd[1]: sshd@140-139.178.90.101:22-147.75.109.163:47558.service: Deactivated successfully. Feb 9 07:34:39.448120 systemd[1]: session-118.scope: Deactivated successfully. Feb 9 07:34:39.448435 systemd-logind[1462]: Session 118 logged out. Waiting for processes to exit. Feb 9 07:34:39.448966 systemd-logind[1462]: Removed session 118. Feb 9 07:34:39.361000 audit[14482]: CRED_ACQ pid=14482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:39.543875 kernel: audit: type=1101 audit(1707464079.360:2853): pid=14482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:39.543915 kernel: audit: type=1103 audit(1707464079.361:2854): pid=14482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:39.543938 kernel: audit: type=1006 audit(1707464079.361:2855): pid=14482 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=118 res=1 Feb 9 07:34:39.602705 kernel: audit: type=1300 audit(1707464079.361:2855): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb4fc88e0 a2=3 a3=0 items=0 ppid=1 pid=14482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=118 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:39.361000 audit[14482]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb4fc88e0 a2=3 a3=0 items=0 ppid=1 pid=14482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=118 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:39.361000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:39.725437 kernel: audit: type=1327 audit(1707464079.361:2855): proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:39.725497 kernel: audit: type=1105 audit(1707464079.366:2856): pid=14482 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:39.366000 audit[14482]: USER_START pid=14482 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:39.367000 audit[14485]: CRED_ACQ pid=14485 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:39.909480 kernel: audit: type=1103 audit(1707464079.367:2857): pid=14485 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:39.909521 kernel: audit: type=1106 audit(1707464079.445:2858): pid=14482 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:39.445000 audit[14482]: USER_END pid=14482 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:40.005211 kernel: audit: type=1104 audit(1707464079.445:2859): pid=14482 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:39.445000 audit[14482]: CRED_DISP pid=14482 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:39.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.90.101:22-147.75.109.163:47558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:44.458335 systemd[1]: Started sshd@141-139.178.90.101:22-147.75.109.163:44632.service. Feb 9 07:34:44.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.90.101:22-147.75.109.163:44632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:44.486288 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:34:44.486351 kernel: audit: type=1130 audit(1707464084.457:2861): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.90.101:22-147.75.109.163:44632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:44.598000 audit[14509]: USER_ACCT pid=14509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:44.600383 sshd[14509]: Accepted publickey for core from 147.75.109.163 port 44632 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:34:44.603244 sshd[14509]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:34:44.608940 systemd-logind[1462]: New session 119 of user core. Feb 9 07:34:44.610605 systemd[1]: Started session-119.scope. Feb 9 07:34:44.601000 audit[14509]: CRED_ACQ pid=14509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:44.782328 kernel: audit: type=1101 audit(1707464084.598:2862): pid=14509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:44.782387 kernel: audit: type=1103 audit(1707464084.601:2863): pid=14509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:44.782409 kernel: audit: type=1006 audit(1707464084.601:2864): pid=14509 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=119 res=1 Feb 9 07:34:44.816598 sshd[14509]: pam_unix(sshd:session): session closed for user core Feb 9 07:34:44.818074 systemd[1]: sshd@141-139.178.90.101:22-147.75.109.163:44632.service: Deactivated successfully. Feb 9 07:34:44.818526 systemd[1]: session-119.scope: Deactivated successfully. Feb 9 07:34:44.818937 systemd-logind[1462]: Session 119 logged out. Waiting for processes to exit. Feb 9 07:34:44.819425 systemd-logind[1462]: Removed session 119. Feb 9 07:34:44.601000 audit[14509]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc8269cf0 a2=3 a3=0 items=0 ppid=1 pid=14509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=119 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:44.841500 kernel: audit: type=1300 audit(1707464084.601:2864): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc8269cf0 a2=3 a3=0 items=0 ppid=1 pid=14509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=119 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:44.601000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:44.963814 kernel: audit: type=1327 audit(1707464084.601:2864): proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:44.963880 kernel: audit: type=1105 audit(1707464084.616:2865): pid=14509 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:44.616000 audit[14509]: USER_START pid=14509 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:44.617000 audit[14511]: CRED_ACQ pid=14511 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:45.147773 kernel: audit: type=1103 audit(1707464084.617:2866): pid=14511 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:45.147828 kernel: audit: type=1106 audit(1707464084.815:2867): pid=14509 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:44.815000 audit[14509]: USER_END pid=14509 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:44.815000 audit[14509]: CRED_DISP pid=14509 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:45.332866 kernel: audit: type=1104 audit(1707464084.815:2868): pid=14509 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:44.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.90.101:22-147.75.109.163:44632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:49.825185 systemd[1]: Started sshd@142-139.178.90.101:22-147.75.109.163:44642.service. Feb 9 07:34:49.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-139.178.90.101:22-147.75.109.163:44642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:49.939414 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:34:49.939465 kernel: audit: type=1130 audit(1707464089.823:2870): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-139.178.90.101:22-147.75.109.163:44642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:49.961000 audit[14560]: USER_ACCT pid=14560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:49.962923 sshd[14560]: Accepted publickey for core from 147.75.109.163 port 44642 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:34:49.963797 sshd[14560]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:34:49.966074 systemd-logind[1462]: New session 120 of user core. Feb 9 07:34:49.966807 systemd[1]: Started session-120.scope. Feb 9 07:34:50.047893 sshd[14560]: pam_unix(sshd:session): session closed for user core Feb 9 07:34:50.049338 systemd[1]: sshd@142-139.178.90.101:22-147.75.109.163:44642.service: Deactivated successfully. Feb 9 07:34:50.049858 systemd[1]: session-120.scope: Deactivated successfully. Feb 9 07:34:50.050234 systemd-logind[1462]: Session 120 logged out. Waiting for processes to exit. Feb 9 07:34:50.050656 systemd-logind[1462]: Removed session 120. Feb 9 07:34:49.962000 audit[14560]: CRED_ACQ pid=14560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:50.146844 kernel: audit: type=1101 audit(1707464089.961:2871): pid=14560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:50.146888 kernel: audit: type=1103 audit(1707464089.962:2872): pid=14560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:50.146906 kernel: audit: type=1006 audit(1707464089.962:2873): pid=14560 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=120 res=1 Feb 9 07:34:50.205577 kernel: audit: type=1300 audit(1707464089.962:2873): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7a1f8de0 a2=3 a3=0 items=0 ppid=1 pid=14560 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=120 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:49.962000 audit[14560]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7a1f8de0 a2=3 a3=0 items=0 ppid=1 pid=14560 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=120 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:49.962000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:50.328196 kernel: audit: type=1327 audit(1707464089.962:2873): proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:50.328230 kernel: audit: type=1105 audit(1707464089.967:2874): pid=14560 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:49.967000 audit[14560]: USER_START pid=14560 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:50.422726 kernel: audit: type=1103 audit(1707464089.968:2875): pid=14562 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:49.968000 audit[14562]: CRED_ACQ pid=14562 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:50.046000 audit[14560]: USER_END pid=14560 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:50.607708 kernel: audit: type=1106 audit(1707464090.046:2876): pid=14560 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:50.607752 kernel: audit: type=1104 audit(1707464090.047:2877): pid=14560 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:50.047000 audit[14560]: CRED_DISP pid=14560 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:50.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-139.178.90.101:22-147.75.109.163:44642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:55.058320 systemd[1]: Started sshd@143-139.178.90.101:22-147.75.109.163:41378.service. Feb 9 07:34:55.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.90.101:22-147.75.109.163:41378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:55.085305 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 07:34:55.085356 kernel: audit: type=1130 audit(1707464095.057:2879): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.90.101:22-147.75.109.163:41378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:55.197000 audit[14624]: USER_ACCT pid=14624 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:55.198009 sshd[14624]: Accepted publickey for core from 147.75.109.163 port 41378 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 07:34:55.199659 sshd[14624]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 07:34:55.202009 systemd-logind[1462]: New session 121 of user core. Feb 9 07:34:55.202707 systemd[1]: Started session-121.scope. Feb 9 07:34:55.281127 sshd[14624]: pam_unix(sshd:session): session closed for user core Feb 9 07:34:55.282333 systemd[1]: sshd@143-139.178.90.101:22-147.75.109.163:41378.service: Deactivated successfully. Feb 9 07:34:55.282793 systemd[1]: session-121.scope: Deactivated successfully. Feb 9 07:34:55.283217 systemd-logind[1462]: Session 121 logged out. Waiting for processes to exit. Feb 9 07:34:55.283780 systemd-logind[1462]: Removed session 121. Feb 9 07:34:55.197000 audit[14624]: CRED_ACQ pid=14624 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:55.379994 kernel: audit: type=1101 audit(1707464095.197:2880): pid=14624 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:55.380034 kernel: audit: type=1103 audit(1707464095.197:2881): pid=14624 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:55.380054 kernel: audit: type=1006 audit(1707464095.197:2882): pid=14624 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=121 res=1 Feb 9 07:34:55.438780 kernel: audit: type=1300 audit(1707464095.197:2882): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe7c0deb0 a2=3 a3=0 items=0 ppid=1 pid=14624 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=121 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:55.197000 audit[14624]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe7c0deb0 a2=3 a3=0 items=0 ppid=1 pid=14624 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=121 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 07:34:55.531046 kernel: audit: type=1327 audit(1707464095.197:2882): proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:55.197000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 07:34:55.561583 kernel: audit: type=1105 audit(1707464095.203:2883): pid=14624 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:55.203000 audit[14624]: USER_START pid=14624 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:55.656227 kernel: audit: type=1103 audit(1707464095.204:2884): pid=14626 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:55.204000 audit[14626]: CRED_ACQ pid=14626 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:55.745582 kernel: audit: type=1106 audit(1707464095.280:2885): pid=14624 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:55.280000 audit[14624]: USER_END pid=14624 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:55.841366 kernel: audit: type=1104 audit(1707464095.280:2886): pid=14624 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:55.280000 audit[14624]: CRED_DISP pid=14624 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 07:34:55.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.90.101:22-147.75.109.163:41378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'