Feb 9 09:54:40.547541 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Feb 9 09:54:40.547557 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 09:54:40.547563 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 09:54:40.547568 kernel: BIOS-provided physical RAM map: Feb 9 09:54:40.547571 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 09:54:40.547575 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 09:54:40.547580 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 09:54:40.547585 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 09:54:40.547588 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 09:54:40.547592 kernel: BIOS-e820: [mem 0x0000000040400000-0x000000006eb34fff] usable Feb 9 09:54:40.547596 kernel: BIOS-e820: [mem 0x000000006eb35000-0x000000006eb35fff] ACPI NVS Feb 9 09:54:40.547600 kernel: BIOS-e820: [mem 0x000000006eb36000-0x000000006eb36fff] reserved Feb 9 09:54:40.547604 kernel: BIOS-e820: [mem 0x000000006eb37000-0x0000000077fc4fff] usable Feb 9 09:54:40.547608 kernel: BIOS-e820: [mem 0x0000000077fc5000-0x00000000790a7fff] reserved Feb 9 09:54:40.547613 kernel: BIOS-e820: [mem 0x00000000790a8000-0x0000000079230fff] usable Feb 9 09:54:40.547618 kernel: BIOS-e820: [mem 0x0000000079231000-0x0000000079662fff] ACPI NVS Feb 9 09:54:40.547622 kernel: BIOS-e820: [mem 0x0000000079663000-0x000000007befefff] reserved Feb 9 09:54:40.547626 kernel: BIOS-e820: [mem 0x000000007beff000-0x000000007befffff] usable Feb 9 09:54:40.547630 kernel: BIOS-e820: [mem 0x000000007bf00000-0x000000007f7fffff] reserved Feb 9 09:54:40.547634 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 09:54:40.547638 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 09:54:40.547643 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 09:54:40.547647 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 09:54:40.547652 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 09:54:40.547656 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000087f7fffff] usable Feb 9 09:54:40.547660 kernel: NX (Execute Disable) protection: active Feb 9 09:54:40.547664 kernel: SMBIOS 3.2.1 present. Feb 9 09:54:40.547668 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Feb 9 09:54:40.547673 kernel: tsc: Detected 3400.000 MHz processor Feb 9 09:54:40.547677 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 09:54:40.547681 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 09:54:40.547686 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 09:54:40.547690 kernel: last_pfn = 0x87f800 max_arch_pfn = 0x400000000 Feb 9 09:54:40.547695 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 09:54:40.547700 kernel: last_pfn = 0x7bf00 max_arch_pfn = 0x400000000 Feb 9 09:54:40.547704 kernel: Using GB pages for direct mapping Feb 9 09:54:40.547708 kernel: ACPI: Early table checksum verification disabled Feb 9 09:54:40.547713 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 09:54:40.547717 kernel: ACPI: XSDT 0x00000000795440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 09:54:40.547722 kernel: ACPI: FACP 0x0000000079580620 000114 (v06 01072009 AMI 00010013) Feb 9 09:54:40.547728 kernel: ACPI: DSDT 0x0000000079544268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 09:54:40.547733 kernel: ACPI: FACS 0x0000000079662F80 000040 Feb 9 09:54:40.547738 kernel: ACPI: APIC 0x0000000079580738 00012C (v04 01072009 AMI 00010013) Feb 9 09:54:40.547743 kernel: ACPI: FPDT 0x0000000079580868 000044 (v01 01072009 AMI 00010013) Feb 9 09:54:40.547747 kernel: ACPI: FIDT 0x00000000795808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 09:54:40.547752 kernel: ACPI: MCFG 0x0000000079580950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 09:54:40.547757 kernel: ACPI: SPMI 0x0000000079580990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 09:54:40.547762 kernel: ACPI: SSDT 0x00000000795809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 09:54:40.547767 kernel: ACPI: SSDT 0x00000000795824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 09:54:40.547772 kernel: ACPI: SSDT 0x00000000795856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 09:54:40.547777 kernel: ACPI: HPET 0x00000000795879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 09:54:40.547781 kernel: ACPI: SSDT 0x0000000079587A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 09:54:40.547786 kernel: ACPI: SSDT 0x00000000795889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 09:54:40.547791 kernel: ACPI: UEFI 0x00000000795892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 09:54:40.547795 kernel: ACPI: LPIT 0x0000000079589318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 09:54:40.547800 kernel: ACPI: SSDT 0x00000000795893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 09:54:40.547806 kernel: ACPI: SSDT 0x000000007958BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 09:54:40.547810 kernel: ACPI: DBGP 0x000000007958D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 09:54:40.547815 kernel: ACPI: DBG2 0x000000007958D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 09:54:40.547820 kernel: ACPI: SSDT 0x000000007958D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 09:54:40.547824 kernel: ACPI: DMAR 0x000000007958EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Feb 9 09:54:40.547829 kernel: ACPI: SSDT 0x000000007958ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 09:54:40.547834 kernel: ACPI: TPM2 0x000000007958EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 09:54:40.547839 kernel: ACPI: SSDT 0x000000007958EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 09:54:40.547844 kernel: ACPI: WSMT 0x000000007958FC28 000028 (v01 \xacn 01072009 AMI 00010013) Feb 9 09:54:40.547849 kernel: ACPI: EINJ 0x000000007958FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 09:54:40.547854 kernel: ACPI: ERST 0x000000007958FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 09:54:40.547858 kernel: ACPI: BERT 0x000000007958FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 09:54:40.547863 kernel: ACPI: HEST 0x000000007958FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 09:54:40.547868 kernel: ACPI: SSDT 0x0000000079590260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 09:54:40.547873 kernel: ACPI: Reserving FACP table memory at [mem 0x79580620-0x79580733] Feb 9 09:54:40.547877 kernel: ACPI: Reserving DSDT table memory at [mem 0x79544268-0x7958061e] Feb 9 09:54:40.547882 kernel: ACPI: Reserving FACS table memory at [mem 0x79662f80-0x79662fbf] Feb 9 09:54:40.547887 kernel: ACPI: Reserving APIC table memory at [mem 0x79580738-0x79580863] Feb 9 09:54:40.547892 kernel: ACPI: Reserving FPDT table memory at [mem 0x79580868-0x795808ab] Feb 9 09:54:40.547897 kernel: ACPI: Reserving FIDT table memory at [mem 0x795808b0-0x7958094b] Feb 9 09:54:40.547901 kernel: ACPI: Reserving MCFG table memory at [mem 0x79580950-0x7958098b] Feb 9 09:54:40.547906 kernel: ACPI: Reserving SPMI table memory at [mem 0x79580990-0x795809d0] Feb 9 09:54:40.547911 kernel: ACPI: Reserving SSDT table memory at [mem 0x795809d8-0x795824f3] Feb 9 09:54:40.547915 kernel: ACPI: Reserving SSDT table memory at [mem 0x795824f8-0x795856bd] Feb 9 09:54:40.547920 kernel: ACPI: Reserving SSDT table memory at [mem 0x795856c0-0x795879ea] Feb 9 09:54:40.547924 kernel: ACPI: Reserving HPET table memory at [mem 0x795879f0-0x79587a27] Feb 9 09:54:40.547930 kernel: ACPI: Reserving SSDT table memory at [mem 0x79587a28-0x795889d5] Feb 9 09:54:40.547935 kernel: ACPI: Reserving SSDT table memory at [mem 0x795889d8-0x795892ce] Feb 9 09:54:40.547939 kernel: ACPI: Reserving UEFI table memory at [mem 0x795892d0-0x79589311] Feb 9 09:54:40.547944 kernel: ACPI: Reserving LPIT table memory at [mem 0x79589318-0x795893ab] Feb 9 09:54:40.547949 kernel: ACPI: Reserving SSDT table memory at [mem 0x795893b0-0x7958bb8d] Feb 9 09:54:40.547953 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958bb90-0x7958d071] Feb 9 09:54:40.547958 kernel: ACPI: Reserving DBGP table memory at [mem 0x7958d078-0x7958d0ab] Feb 9 09:54:40.547963 kernel: ACPI: Reserving DBG2 table memory at [mem 0x7958d0b0-0x7958d103] Feb 9 09:54:40.547967 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958d108-0x7958ec6e] Feb 9 09:54:40.547973 kernel: ACPI: Reserving DMAR table memory at [mem 0x7958ec70-0x7958ed17] Feb 9 09:54:40.547977 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958ed18-0x7958ee5b] Feb 9 09:54:40.547982 kernel: ACPI: Reserving TPM2 table memory at [mem 0x7958ee60-0x7958ee93] Feb 9 09:54:40.547987 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958ee98-0x7958fc26] Feb 9 09:54:40.547991 kernel: ACPI: Reserving WSMT table memory at [mem 0x7958fc28-0x7958fc4f] Feb 9 09:54:40.547996 kernel: ACPI: Reserving EINJ table memory at [mem 0x7958fc50-0x7958fd7f] Feb 9 09:54:40.548001 kernel: ACPI: Reserving ERST table memory at [mem 0x7958fd80-0x7958ffaf] Feb 9 09:54:40.548005 kernel: ACPI: Reserving BERT table memory at [mem 0x7958ffb0-0x7958ffdf] Feb 9 09:54:40.548010 kernel: ACPI: Reserving HEST table memory at [mem 0x7958ffe0-0x7959025b] Feb 9 09:54:40.548016 kernel: ACPI: Reserving SSDT table memory at [mem 0x79590260-0x795903c1] Feb 9 09:54:40.548021 kernel: No NUMA configuration found Feb 9 09:54:40.548025 kernel: Faking a node at [mem 0x0000000000000000-0x000000087f7fffff] Feb 9 09:54:40.548030 kernel: NODE_DATA(0) allocated [mem 0x87f7fa000-0x87f7fffff] Feb 9 09:54:40.548035 kernel: Zone ranges: Feb 9 09:54:40.548039 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 09:54:40.548044 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 09:54:40.548049 kernel: Normal [mem 0x0000000100000000-0x000000087f7fffff] Feb 9 09:54:40.548053 kernel: Movable zone start for each node Feb 9 09:54:40.548059 kernel: Early memory node ranges Feb 9 09:54:40.548064 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 09:54:40.548068 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 09:54:40.548073 kernel: node 0: [mem 0x0000000040400000-0x000000006eb34fff] Feb 9 09:54:40.548078 kernel: node 0: [mem 0x000000006eb37000-0x0000000077fc4fff] Feb 9 09:54:40.548082 kernel: node 0: [mem 0x00000000790a8000-0x0000000079230fff] Feb 9 09:54:40.548087 kernel: node 0: [mem 0x000000007beff000-0x000000007befffff] Feb 9 09:54:40.548092 kernel: node 0: [mem 0x0000000100000000-0x000000087f7fffff] Feb 9 09:54:40.548097 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000087f7fffff] Feb 9 09:54:40.548105 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 09:54:40.548110 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 09:54:40.548115 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 09:54:40.548121 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 09:54:40.548126 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Feb 9 09:54:40.548131 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Feb 9 09:54:40.548136 kernel: On node 0, zone Normal: 16640 pages in unavailable ranges Feb 9 09:54:40.548141 kernel: On node 0, zone Normal: 2048 pages in unavailable ranges Feb 9 09:54:40.548147 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 09:54:40.548152 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 09:54:40.548157 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 09:54:40.548162 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 09:54:40.548167 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 09:54:40.548172 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 09:54:40.548177 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 09:54:40.548182 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 09:54:40.548187 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 09:54:40.548193 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 09:54:40.548198 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 09:54:40.548203 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 09:54:40.548208 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 09:54:40.548213 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 09:54:40.548218 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 09:54:40.548222 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 09:54:40.548227 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 09:54:40.548232 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 09:54:40.548238 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 09:54:40.548243 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 09:54:40.548248 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 09:54:40.548253 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 09:54:40.548258 kernel: TSC deadline timer available Feb 9 09:54:40.548263 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 09:54:40.548268 kernel: [mem 0x7f800000-0xdfffffff] available for PCI devices Feb 9 09:54:40.548273 kernel: Booting paravirtualized kernel on bare hardware Feb 9 09:54:40.548278 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 09:54:40.548284 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 09:54:40.548290 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 09:54:40.548295 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 09:54:40.548299 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 09:54:40.548304 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8222327 Feb 9 09:54:40.548309 kernel: Policy zone: Normal Feb 9 09:54:40.548315 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 09:54:40.548320 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 09:54:40.548326 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 09:54:40.548331 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 09:54:40.548336 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 09:54:40.548341 kernel: Memory: 32683728K/33411988K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 9 09:54:40.548347 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 09:54:40.548352 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 09:54:40.548357 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 09:54:40.548362 kernel: rcu: Hierarchical RCU implementation. Feb 9 09:54:40.548367 kernel: rcu: RCU event tracing is enabled. Feb 9 09:54:40.548373 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 09:54:40.548378 kernel: Rude variant of Tasks RCU enabled. Feb 9 09:54:40.548383 kernel: Tracing variant of Tasks RCU enabled. Feb 9 09:54:40.548388 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 09:54:40.548393 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 09:54:40.548398 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 09:54:40.548403 kernel: random: crng init done Feb 9 09:54:40.548408 kernel: Console: colour dummy device 80x25 Feb 9 09:54:40.548413 kernel: printk: console [tty0] enabled Feb 9 09:54:40.548419 kernel: printk: console [ttyS1] enabled Feb 9 09:54:40.548424 kernel: ACPI: Core revision 20210730 Feb 9 09:54:40.548429 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Feb 9 09:54:40.548434 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 09:54:40.548439 kernel: DMAR: Host address width 39 Feb 9 09:54:40.548444 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Feb 9 09:54:40.548449 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Feb 9 09:54:40.548454 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 09:54:40.548459 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 09:54:40.548464 kernel: DMAR: RMRR base: 0x00000079f11000 end: 0x0000007a15afff Feb 9 09:54:40.548470 kernel: DMAR: RMRR base: 0x0000007d000000 end: 0x0000007f7fffff Feb 9 09:54:40.548475 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Feb 9 09:54:40.548480 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 09:54:40.548484 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 09:54:40.548489 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 09:54:40.548495 kernel: x2apic enabled Feb 9 09:54:40.548500 kernel: Switched APIC routing to cluster x2apic. Feb 9 09:54:40.548505 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 09:54:40.548510 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 09:54:40.548516 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 09:54:40.548521 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 09:54:40.548526 kernel: process: using mwait in idle threads Feb 9 09:54:40.548531 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 09:54:40.548536 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 09:54:40.548541 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 09:54:40.548546 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 09:54:40.548553 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 09:54:40.548559 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 09:54:40.548564 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 09:54:40.548569 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 09:54:40.548574 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 09:54:40.548579 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 09:54:40.548585 kernel: TAA: Mitigation: TSX disabled Feb 9 09:54:40.548590 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 09:54:40.548595 kernel: SRBDS: Mitigation: Microcode Feb 9 09:54:40.548599 kernel: GDS: Vulnerable: No microcode Feb 9 09:54:40.548605 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 09:54:40.548611 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 09:54:40.548616 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 09:54:40.548621 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 09:54:40.548626 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 09:54:40.548631 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 09:54:40.548636 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 09:54:40.548641 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 09:54:40.548646 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 09:54:40.548651 kernel: Freeing SMP alternatives memory: 32K Feb 9 09:54:40.548656 kernel: pid_max: default: 32768 minimum: 301 Feb 9 09:54:40.548661 kernel: LSM: Security Framework initializing Feb 9 09:54:40.548666 kernel: SELinux: Initializing. Feb 9 09:54:40.548671 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 09:54:40.548676 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 09:54:40.548681 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 09:54:40.548686 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 09:54:40.548692 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 09:54:40.548697 kernel: ... version: 4 Feb 9 09:54:40.548702 kernel: ... bit width: 48 Feb 9 09:54:40.548707 kernel: ... generic registers: 4 Feb 9 09:54:40.548712 kernel: ... value mask: 0000ffffffffffff Feb 9 09:54:40.548717 kernel: ... max period: 00007fffffffffff Feb 9 09:54:40.548722 kernel: ... fixed-purpose events: 3 Feb 9 09:54:40.548727 kernel: ... event mask: 000000070000000f Feb 9 09:54:40.548732 kernel: signal: max sigframe size: 2032 Feb 9 09:54:40.548737 kernel: rcu: Hierarchical SRCU implementation. Feb 9 09:54:40.548743 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 09:54:40.548748 kernel: smp: Bringing up secondary CPUs ... Feb 9 09:54:40.548753 kernel: x86: Booting SMP configuration: Feb 9 09:54:40.548758 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 09:54:40.548763 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 09:54:40.548768 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 09:54:40.548773 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 09:54:40.548778 kernel: smpboot: Max logical packages: 1 Feb 9 09:54:40.548783 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 09:54:40.548789 kernel: devtmpfs: initialized Feb 9 09:54:40.548794 kernel: x86/mm: Memory block size: 128MB Feb 9 09:54:40.548799 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6eb35000-0x6eb35fff] (4096 bytes) Feb 9 09:54:40.548804 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x79231000-0x79662fff] (4399104 bytes) Feb 9 09:54:40.548809 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 09:54:40.548814 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 09:54:40.548819 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 09:54:40.548824 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 09:54:40.548830 kernel: audit: initializing netlink subsys (disabled) Feb 9 09:54:40.548835 kernel: audit: type=2000 audit(1707472475.120:1): state=initialized audit_enabled=0 res=1 Feb 9 09:54:40.548840 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 09:54:40.548845 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 09:54:40.548850 kernel: cpuidle: using governor menu Feb 9 09:54:40.548855 kernel: ACPI: bus type PCI registered Feb 9 09:54:40.548860 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 09:54:40.548865 kernel: dca service started, version 1.12.1 Feb 9 09:54:40.548870 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 09:54:40.548876 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 09:54:40.548881 kernel: PCI: Using configuration type 1 for base access Feb 9 09:54:40.548886 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 09:54:40.548891 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 09:54:40.548896 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 09:54:40.548901 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 09:54:40.548906 kernel: ACPI: Added _OSI(Module Device) Feb 9 09:54:40.548911 kernel: ACPI: Added _OSI(Processor Device) Feb 9 09:54:40.548916 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 09:54:40.548921 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 09:54:40.548926 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 09:54:40.548931 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 09:54:40.548936 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 09:54:40.548941 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 09:54:40.548946 kernel: ACPI: Dynamic OEM Table Load: Feb 9 09:54:40.548952 kernel: ACPI: SSDT 0xFFFFA0B240214D00 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 09:54:40.548957 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 09:54:40.548962 kernel: ACPI: Dynamic OEM Table Load: Feb 9 09:54:40.548967 kernel: ACPI: SSDT 0xFFFFA0B241CEF000 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 09:54:40.548973 kernel: ACPI: Dynamic OEM Table Load: Feb 9 09:54:40.548977 kernel: ACPI: SSDT 0xFFFFA0B241C5C000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 09:54:40.548982 kernel: ACPI: Dynamic OEM Table Load: Feb 9 09:54:40.548987 kernel: ACPI: SSDT 0xFFFFA0B241C59800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 09:54:40.548992 kernel: ACPI: Dynamic OEM Table Load: Feb 9 09:54:40.548997 kernel: ACPI: SSDT 0xFFFFA0B24014F000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 09:54:40.549002 kernel: ACPI: Dynamic OEM Table Load: Feb 9 09:54:40.549007 kernel: ACPI: SSDT 0xFFFFA0B241CEEC00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 09:54:40.549012 kernel: ACPI: Interpreter enabled Feb 9 09:54:40.549018 kernel: ACPI: PM: (supports S0 S5) Feb 9 09:54:40.549023 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 09:54:40.549028 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 09:54:40.549033 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 09:54:40.549038 kernel: HEST: Table parsing has been initialized. Feb 9 09:54:40.549043 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 09:54:40.549048 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 09:54:40.549053 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 09:54:40.549058 kernel: ACPI: PM: Power Resource [USBC] Feb 9 09:54:40.549064 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 09:54:40.549069 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 09:54:40.549074 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 09:54:40.549079 kernel: ACPI: PM: Power Resource [WRST] Feb 9 09:54:40.549084 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 9 09:54:40.549089 kernel: ACPI: PM: Power Resource [FN00] Feb 9 09:54:40.549093 kernel: ACPI: PM: Power Resource [FN01] Feb 9 09:54:40.549098 kernel: ACPI: PM: Power Resource [FN02] Feb 9 09:54:40.549103 kernel: ACPI: PM: Power Resource [FN03] Feb 9 09:54:40.549108 kernel: ACPI: PM: Power Resource [FN04] Feb 9 09:54:40.549114 kernel: ACPI: PM: Power Resource [PIN] Feb 9 09:54:40.549119 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 09:54:40.549184 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 09:54:40.549229 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 09:54:40.549270 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 09:54:40.549278 kernel: PCI host bridge to bus 0000:00 Feb 9 09:54:40.549321 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 09:54:40.549360 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 09:54:40.549397 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 09:54:40.549433 kernel: pci_bus 0000:00: root bus resource [mem 0x7f800000-0xdfffffff window] Feb 9 09:54:40.549469 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 09:54:40.549505 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 09:54:40.549557 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 09:54:40.549610 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 09:54:40.549653 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 09:54:40.549701 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Feb 9 09:54:40.549743 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Feb 9 09:54:40.549791 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Feb 9 09:54:40.549833 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x94000000-0x94ffffff 64bit] Feb 9 09:54:40.549877 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Feb 9 09:54:40.549919 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Feb 9 09:54:40.549966 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 09:54:40.550010 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9651f000-0x9651ffff 64bit] Feb 9 09:54:40.550055 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 09:54:40.550097 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9651e000-0x9651efff 64bit] Feb 9 09:54:40.550142 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 09:54:40.550187 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x96500000-0x9650ffff 64bit] Feb 9 09:54:40.550228 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 09:54:40.550275 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 09:54:40.550317 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x96512000-0x96513fff 64bit] Feb 9 09:54:40.550358 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9651d000-0x9651dfff 64bit] Feb 9 09:54:40.550402 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 09:54:40.550445 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 09:54:40.550492 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 09:54:40.550533 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 09:54:40.550581 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 09:54:40.550623 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9651a000-0x9651afff 64bit] Feb 9 09:54:40.550671 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 09:54:40.550717 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 09:54:40.550758 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x96519000-0x96519fff 64bit] Feb 9 09:54:40.550802 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 09:54:40.550846 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 09:54:40.550888 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x96518000-0x96518fff 64bit] Feb 9 09:54:40.550929 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 09:54:40.550973 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 09:54:40.551017 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x96510000-0x96511fff] Feb 9 09:54:40.551058 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x96517000-0x965170ff] Feb 9 09:54:40.551100 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Feb 9 09:54:40.551141 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Feb 9 09:54:40.551182 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Feb 9 09:54:40.551223 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x96516000-0x965167ff] Feb 9 09:54:40.551264 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 09:54:40.551315 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 09:54:40.551357 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 09:54:40.551405 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 09:54:40.551449 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 09:54:40.551496 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 09:54:40.551538 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 09:54:40.551586 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 09:54:40.551629 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 09:54:40.551674 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Feb 9 09:54:40.551717 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Feb 9 09:54:40.551764 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 09:54:40.551808 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 09:54:40.551855 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 09:54:40.551901 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 09:54:40.551942 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x96514000-0x965140ff 64bit] Feb 9 09:54:40.551984 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 09:54:40.552031 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 09:54:40.552073 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 09:54:40.552115 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 09:54:40.552162 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 09:54:40.552207 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 09:54:40.552250 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x96200000-0x962fffff pref] Feb 9 09:54:40.552293 kernel: pci 0000:02:00.0: PME# supported from D3cold Feb 9 09:54:40.552338 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 09:54:40.552381 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 09:54:40.552428 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 09:54:40.552472 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 09:54:40.552514 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x96100000-0x961fffff pref] Feb 9 09:54:40.552560 kernel: pci 0000:02:00.1: PME# supported from D3cold Feb 9 09:54:40.552603 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 09:54:40.552648 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 09:54:40.552691 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 09:54:40.552732 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 9 09:54:40.552774 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 09:54:40.552815 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 09:54:40.552862 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 09:54:40.552906 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x96400000-0x9647ffff] Feb 9 09:54:40.552951 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 09:54:40.552994 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x96480000-0x96483fff] Feb 9 09:54:40.553037 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 09:54:40.553078 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 09:54:40.553119 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 09:54:40.553162 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 9 09:54:40.553212 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Feb 9 09:54:40.553291 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x96300000-0x9637ffff] Feb 9 09:54:40.553358 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 09:54:40.553400 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x96380000-0x96383fff] Feb 9 09:54:40.553443 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Feb 9 09:54:40.553485 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 09:54:40.553527 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 09:54:40.553571 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 9 09:54:40.553613 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 09:54:40.553659 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 09:54:40.553706 kernel: pci 0000:07:00.0: enabling Extended Tags Feb 9 09:54:40.553749 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 09:54:40.553792 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 09:54:40.553834 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 09:54:40.553876 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 09:54:40.553917 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 9 09:54:40.553964 kernel: pci_bus 0000:08: extended config space not accessible Feb 9 09:54:40.554016 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 09:54:40.554063 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x95000000-0x95ffffff] Feb 9 09:54:40.554108 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x96000000-0x9601ffff] Feb 9 09:54:40.554154 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 09:54:40.554199 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 09:54:40.554244 kernel: pci 0000:08:00.0: supports D1 D2 Feb 9 09:54:40.554289 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 09:54:40.554336 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 09:54:40.554380 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 09:54:40.554423 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 9 09:54:40.554431 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 09:54:40.554437 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 09:54:40.554442 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 09:54:40.554448 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 09:54:40.554453 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 09:54:40.554460 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 09:54:40.554465 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 09:54:40.554471 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 09:54:40.554476 kernel: iommu: Default domain type: Translated Feb 9 09:54:40.554481 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 09:54:40.554525 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Feb 9 09:54:40.554574 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 09:54:40.554620 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Feb 9 09:54:40.554627 kernel: vgaarb: loaded Feb 9 09:54:40.554634 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 09:54:40.554640 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 09:54:40.554645 kernel: PTP clock support registered Feb 9 09:54:40.554651 kernel: PCI: Using ACPI for IRQ routing Feb 9 09:54:40.554656 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 09:54:40.554661 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 09:54:40.554667 kernel: e820: reserve RAM buffer [mem 0x6eb35000-0x6fffffff] Feb 9 09:54:40.554672 kernel: e820: reserve RAM buffer [mem 0x77fc5000-0x77ffffff] Feb 9 09:54:40.554677 kernel: e820: reserve RAM buffer [mem 0x79231000-0x7bffffff] Feb 9 09:54:40.554683 kernel: e820: reserve RAM buffer [mem 0x7bf00000-0x7bffffff] Feb 9 09:54:40.554688 kernel: e820: reserve RAM buffer [mem 0x87f800000-0x87fffffff] Feb 9 09:54:40.554694 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 9 09:54:40.554699 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Feb 9 09:54:40.554704 kernel: clocksource: Switched to clocksource tsc-early Feb 9 09:54:40.554710 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 09:54:40.554715 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 09:54:40.554720 kernel: pnp: PnP ACPI init Feb 9 09:54:40.554764 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 09:54:40.554811 kernel: pnp 00:02: [dma 0 disabled] Feb 9 09:54:40.554853 kernel: pnp 00:03: [dma 0 disabled] Feb 9 09:54:40.554893 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 09:54:40.554931 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 09:54:40.554972 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 09:54:40.555013 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 09:54:40.555054 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 09:54:40.555091 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 09:54:40.555128 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 09:54:40.555166 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 09:54:40.555203 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 09:54:40.555241 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 09:54:40.555279 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 09:54:40.555322 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 09:54:40.555359 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 09:54:40.555396 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 09:54:40.555436 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 09:54:40.555472 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 09:54:40.555509 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 09:54:40.555547 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 09:54:40.555612 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 09:54:40.555620 kernel: pnp: PnP ACPI: found 10 devices Feb 9 09:54:40.555626 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 09:54:40.555631 kernel: NET: Registered PF_INET protocol family Feb 9 09:54:40.555637 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 09:54:40.555642 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 09:54:40.555647 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 09:54:40.555653 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 09:54:40.555659 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 09:54:40.555664 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 09:54:40.555670 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 09:54:40.555675 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 09:54:40.555680 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 09:54:40.555685 kernel: NET: Registered PF_XDP protocol family Feb 9 09:54:40.555726 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7f800000-0x7f800fff 64bit] Feb 9 09:54:40.555768 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7f801000-0x7f801fff 64bit] Feb 9 09:54:40.555812 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7f802000-0x7f802fff 64bit] Feb 9 09:54:40.555853 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 09:54:40.555897 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 09:54:40.555939 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 09:54:40.555983 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 09:54:40.556027 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 09:54:40.556070 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 09:54:40.556112 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 9 09:54:40.556154 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 09:54:40.556195 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 09:54:40.556236 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 09:54:40.556279 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 09:54:40.556320 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 9 09:54:40.556364 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 09:54:40.556406 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 09:54:40.556447 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 9 09:54:40.556488 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 09:54:40.556531 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 09:54:40.556620 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 09:54:40.556663 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 9 09:54:40.556706 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 09:54:40.556747 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 09:54:40.556790 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 9 09:54:40.556827 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 09:54:40.556865 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 09:54:40.556900 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 09:54:40.556935 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 09:54:40.556972 kernel: pci_bus 0000:00: resource 7 [mem 0x7f800000-0xdfffffff window] Feb 9 09:54:40.557007 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 09:54:40.557051 kernel: pci_bus 0000:02: resource 1 [mem 0x96100000-0x962fffff] Feb 9 09:54:40.557091 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 09:54:40.557135 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Feb 9 09:54:40.557173 kernel: pci_bus 0000:04: resource 1 [mem 0x96400000-0x964fffff] Feb 9 09:54:40.557214 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Feb 9 09:54:40.557253 kernel: pci_bus 0000:05: resource 1 [mem 0x96300000-0x963fffff] Feb 9 09:54:40.557293 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 09:54:40.557334 kernel: pci_bus 0000:07: resource 1 [mem 0x95000000-0x960fffff] Feb 9 09:54:40.557374 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Feb 9 09:54:40.557415 kernel: pci_bus 0000:08: resource 1 [mem 0x95000000-0x960fffff] Feb 9 09:54:40.557422 kernel: PCI: CLS 64 bytes, default 64 Feb 9 09:54:40.557428 kernel: DMAR: No ATSR found Feb 9 09:54:40.557433 kernel: DMAR: No SATC found Feb 9 09:54:40.557438 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Feb 9 09:54:40.557444 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Feb 9 09:54:40.557450 kernel: DMAR: IOMMU feature nwfs inconsistent Feb 9 09:54:40.557456 kernel: DMAR: IOMMU feature pasid inconsistent Feb 9 09:54:40.557461 kernel: DMAR: IOMMU feature eafs inconsistent Feb 9 09:54:40.557466 kernel: DMAR: IOMMU feature prs inconsistent Feb 9 09:54:40.557471 kernel: DMAR: IOMMU feature nest inconsistent Feb 9 09:54:40.557476 kernel: DMAR: IOMMU feature mts inconsistent Feb 9 09:54:40.557482 kernel: DMAR: IOMMU feature sc_support inconsistent Feb 9 09:54:40.557487 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Feb 9 09:54:40.557492 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 09:54:40.557498 kernel: DMAR: dmar1: Using Queued invalidation Feb 9 09:54:40.557540 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 09:54:40.557628 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 09:54:40.557670 kernel: pci 0000:00:01.1: Adding to iommu group 1 Feb 9 09:54:40.557711 kernel: pci 0000:00:02.0: Adding to iommu group 2 Feb 9 09:54:40.557753 kernel: pci 0000:00:08.0: Adding to iommu group 3 Feb 9 09:54:40.557794 kernel: pci 0000:00:12.0: Adding to iommu group 4 Feb 9 09:54:40.557835 kernel: pci 0000:00:14.0: Adding to iommu group 5 Feb 9 09:54:40.557877 kernel: pci 0000:00:14.2: Adding to iommu group 5 Feb 9 09:54:40.557919 kernel: pci 0000:00:15.0: Adding to iommu group 6 Feb 9 09:54:40.557958 kernel: pci 0000:00:15.1: Adding to iommu group 6 Feb 9 09:54:40.557998 kernel: pci 0000:00:16.0: Adding to iommu group 7 Feb 9 09:54:40.558039 kernel: pci 0000:00:16.1: Adding to iommu group 7 Feb 9 09:54:40.558079 kernel: pci 0000:00:16.4: Adding to iommu group 7 Feb 9 09:54:40.558122 kernel: pci 0000:00:17.0: Adding to iommu group 8 Feb 9 09:54:40.558163 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Feb 9 09:54:40.558206 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Feb 9 09:54:40.558248 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Feb 9 09:54:40.558290 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Feb 9 09:54:40.558331 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Feb 9 09:54:40.558371 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Feb 9 09:54:40.558412 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Feb 9 09:54:40.558453 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Feb 9 09:54:40.558494 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Feb 9 09:54:40.558536 kernel: pci 0000:02:00.0: Adding to iommu group 1 Feb 9 09:54:40.558629 kernel: pci 0000:02:00.1: Adding to iommu group 1 Feb 9 09:54:40.558671 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 09:54:40.558715 kernel: pci 0000:05:00.0: Adding to iommu group 17 Feb 9 09:54:40.558757 kernel: pci 0000:07:00.0: Adding to iommu group 18 Feb 9 09:54:40.558802 kernel: pci 0000:08:00.0: Adding to iommu group 18 Feb 9 09:54:40.558810 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 09:54:40.558816 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 09:54:40.558822 kernel: software IO TLB: mapped [mem 0x0000000073fc5000-0x0000000077fc5000] (64MB) Feb 9 09:54:40.558828 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Feb 9 09:54:40.558833 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 09:54:40.558838 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 09:54:40.558843 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 09:54:40.558849 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Feb 9 09:54:40.558895 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 09:54:40.558903 kernel: Initialise system trusted keyrings Feb 9 09:54:40.558910 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 09:54:40.558915 kernel: Key type asymmetric registered Feb 9 09:54:40.558920 kernel: Asymmetric key parser 'x509' registered Feb 9 09:54:40.558925 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 09:54:40.558930 kernel: io scheduler mq-deadline registered Feb 9 09:54:40.558936 kernel: io scheduler kyber registered Feb 9 09:54:40.558941 kernel: io scheduler bfq registered Feb 9 09:54:40.558981 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Feb 9 09:54:40.559024 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Feb 9 09:54:40.559068 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Feb 9 09:54:40.559110 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Feb 9 09:54:40.559150 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Feb 9 09:54:40.559192 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Feb 9 09:54:40.559233 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Feb 9 09:54:40.559280 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 09:54:40.559288 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 09:54:40.559294 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 09:54:40.559300 kernel: pstore: Registered erst as persistent store backend Feb 9 09:54:40.559305 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 09:54:40.559311 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 09:54:40.559316 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 09:54:40.559321 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 09:54:40.559362 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 09:54:40.559370 kernel: i8042: PNP: No PS/2 controller found. Feb 9 09:54:40.559409 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 09:54:40.559447 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 09:54:40.559484 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T09:54:39 UTC (1707472479) Feb 9 09:54:40.559522 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 09:54:40.559529 kernel: fail to initialize ptp_kvm Feb 9 09:54:40.559535 kernel: intel_pstate: Intel P-state driver initializing Feb 9 09:54:40.559540 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 09:54:40.559545 kernel: intel_pstate: HWP enabled Feb 9 09:54:40.559554 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 09:54:40.559582 kernel: vesafb: scrolling: redraw Feb 9 09:54:40.559587 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 09:54:40.559593 kernel: vesafb: framebuffer at 0x95000000, mapped to 0x000000001bb2df7a, using 768k, total 768k Feb 9 09:54:40.559619 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 09:54:40.559624 kernel: fb0: VESA VGA frame buffer device Feb 9 09:54:40.559629 kernel: NET: Registered PF_INET6 protocol family Feb 9 09:54:40.559634 kernel: Segment Routing with IPv6 Feb 9 09:54:40.559640 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 09:54:40.559645 kernel: NET: Registered PF_PACKET protocol family Feb 9 09:54:40.559651 kernel: Key type dns_resolver registered Feb 9 09:54:40.559656 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 09:54:40.559661 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 09:54:40.559667 kernel: IPI shorthand broadcast: enabled Feb 9 09:54:40.559672 kernel: sched_clock: Marking stable (1846600663, 1360101877)->(4630221257, -1423518717) Feb 9 09:54:40.559677 kernel: registered taskstats version 1 Feb 9 09:54:40.559682 kernel: Loading compiled-in X.509 certificates Feb 9 09:54:40.559688 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 09:54:40.559693 kernel: Key type .fscrypt registered Feb 9 09:54:40.559699 kernel: Key type fscrypt-provisioning registered Feb 9 09:54:40.559704 kernel: pstore: Using crash dump compression: deflate Feb 9 09:54:40.559709 kernel: ima: Allocated hash algorithm: sha1 Feb 9 09:54:40.559715 kernel: ima: No architecture policies found Feb 9 09:54:40.559720 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 09:54:40.559725 kernel: Write protecting the kernel read-only data: 28672k Feb 9 09:54:40.559730 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 09:54:40.559735 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 09:54:40.559741 kernel: Run /init as init process Feb 9 09:54:40.559747 kernel: with arguments: Feb 9 09:54:40.559752 kernel: /init Feb 9 09:54:40.559757 kernel: with environment: Feb 9 09:54:40.559762 kernel: HOME=/ Feb 9 09:54:40.559767 kernel: TERM=linux Feb 9 09:54:40.559772 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 09:54:40.559779 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:54:40.559787 systemd[1]: Detected architecture x86-64. Feb 9 09:54:40.559792 systemd[1]: Running in initrd. Feb 9 09:54:40.559798 systemd[1]: No hostname configured, using default hostname. Feb 9 09:54:40.559803 systemd[1]: Hostname set to . Feb 9 09:54:40.559808 systemd[1]: Initializing machine ID from random generator. Feb 9 09:54:40.559814 systemd[1]: Queued start job for default target initrd.target. Feb 9 09:54:40.559819 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:54:40.559825 systemd[1]: Reached target cryptsetup.target. Feb 9 09:54:40.559831 systemd[1]: Reached target paths.target. Feb 9 09:54:40.559836 systemd[1]: Reached target slices.target. Feb 9 09:54:40.559841 systemd[1]: Reached target swap.target. Feb 9 09:54:40.559847 systemd[1]: Reached target timers.target. Feb 9 09:54:40.559852 systemd[1]: Listening on iscsid.socket. Feb 9 09:54:40.559858 systemd[1]: Listening on iscsiuio.socket. Feb 9 09:54:40.559863 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 09:54:40.559869 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 09:54:40.559875 systemd[1]: Listening on systemd-journald.socket. Feb 9 09:54:40.559880 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:54:40.559886 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Feb 9 09:54:40.559891 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:54:40.559897 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Feb 9 09:54:40.559902 kernel: clocksource: Switched to clocksource tsc Feb 9 09:54:40.559907 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:54:40.559913 systemd[1]: Reached target sockets.target. Feb 9 09:54:40.559918 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:54:40.559924 systemd[1]: Finished network-cleanup.service. Feb 9 09:54:40.559930 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 09:54:40.559935 systemd[1]: Starting systemd-journald.service... Feb 9 09:54:40.559941 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:54:40.559949 systemd-journald[268]: Journal started Feb 9 09:54:40.559974 systemd-journald[268]: Runtime Journal (/run/log/journal/130e2a3b9d384978ba9ab16677ee2d55) is 8.0M, max 639.3M, 631.3M free. Feb 9 09:54:40.562084 systemd-modules-load[269]: Inserted module 'overlay' Feb 9 09:54:40.568000 audit: BPF prog-id=6 op=LOAD Feb 9 09:54:40.586556 kernel: audit: type=1334 audit(1707472480.568:2): prog-id=6 op=LOAD Feb 9 09:54:40.586582 systemd[1]: Starting systemd-resolved.service... Feb 9 09:54:40.635557 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 09:54:40.635572 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 09:54:40.667591 kernel: Bridge firewalling registered Feb 9 09:54:40.667607 systemd[1]: Started systemd-journald.service. Feb 9 09:54:40.682321 systemd-modules-load[269]: Inserted module 'br_netfilter' Feb 9 09:54:40.730660 kernel: audit: type=1130 audit(1707472480.690:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.688034 systemd-resolved[271]: Positive Trust Anchors: Feb 9 09:54:40.788108 kernel: SCSI subsystem initialized Feb 9 09:54:40.788118 kernel: audit: type=1130 audit(1707472480.742:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.688039 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:54:40.910592 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 09:54:40.910605 kernel: audit: type=1130 audit(1707472480.813:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.910687 kernel: device-mapper: uevent: version 1.0.3 Feb 9 09:54:40.910695 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 09:54:40.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.688059 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:54:40.984799 kernel: audit: type=1130 audit(1707472480.918:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.689612 systemd-resolved[271]: Defaulting to hostname 'linux'. Feb 9 09:54:41.038673 kernel: audit: type=1130 audit(1707472480.993:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.690770 systemd[1]: Started systemd-resolved.service. Feb 9 09:54:41.099776 kernel: audit: type=1130 audit(1707472481.046:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:41.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.742722 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:54:40.813704 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 09:54:40.910858 systemd-modules-load[269]: Inserted module 'dm_multipath' Feb 9 09:54:40.918836 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:54:40.993901 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 09:54:41.047037 systemd[1]: Reached target nss-lookup.target. Feb 9 09:54:41.109150 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 09:54:41.130054 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:54:41.130357 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 09:54:41.133165 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 09:54:41.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:41.133826 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:54:41.183768 kernel: audit: type=1130 audit(1707472481.132:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:41.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:41.196906 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 09:54:41.262656 kernel: audit: type=1130 audit(1707472481.196:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:41.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:41.255215 systemd[1]: Starting dracut-cmdline.service... Feb 9 09:54:41.276654 dracut-cmdline[295]: dracut-dracut-053 Feb 9 09:54:41.276654 dracut-cmdline[295]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 09:54:41.276654 dracut-cmdline[295]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 09:54:41.346593 kernel: Loading iSCSI transport class v2.0-870. Feb 9 09:54:41.346606 kernel: iscsi: registered transport (tcp) Feb 9 09:54:41.398355 kernel: iscsi: registered transport (qla4xxx) Feb 9 09:54:41.398370 kernel: QLogic iSCSI HBA Driver Feb 9 09:54:41.414388 systemd[1]: Finished dracut-cmdline.service. Feb 9 09:54:41.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:41.423272 systemd[1]: Starting dracut-pre-udev.service... Feb 9 09:54:41.480630 kernel: raid6: avx2x4 gen() 42380 MB/s Feb 9 09:54:41.516588 kernel: raid6: avx2x4 xor() 16538 MB/s Feb 9 09:54:41.551586 kernel: raid6: avx2x2 gen() 52962 MB/s Feb 9 09:54:41.586586 kernel: raid6: avx2x2 xor() 32137 MB/s Feb 9 09:54:41.621633 kernel: raid6: avx2x1 gen() 45262 MB/s Feb 9 09:54:41.656631 kernel: raid6: avx2x1 xor() 27953 MB/s Feb 9 09:54:41.691633 kernel: raid6: sse2x4 gen() 21357 MB/s Feb 9 09:54:41.725557 kernel: raid6: sse2x4 xor() 11983 MB/s Feb 9 09:54:41.759635 kernel: raid6: sse2x2 gen() 21692 MB/s Feb 9 09:54:41.793589 kernel: raid6: sse2x2 xor() 13456 MB/s Feb 9 09:54:41.827589 kernel: raid6: sse2x1 gen() 18288 MB/s Feb 9 09:54:41.879449 kernel: raid6: sse2x1 xor() 8900 MB/s Feb 9 09:54:41.879464 kernel: raid6: using algorithm avx2x2 gen() 52962 MB/s Feb 9 09:54:41.879472 kernel: raid6: .... xor() 32137 MB/s, rmw enabled Feb 9 09:54:41.897634 kernel: raid6: using avx2x2 recovery algorithm Feb 9 09:54:41.943558 kernel: xor: automatically using best checksumming function avx Feb 9 09:54:42.022590 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 09:54:42.027347 systemd[1]: Finished dracut-pre-udev.service. Feb 9 09:54:42.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:42.035000 audit: BPF prog-id=7 op=LOAD Feb 9 09:54:42.035000 audit: BPF prog-id=8 op=LOAD Feb 9 09:54:42.036561 systemd[1]: Starting systemd-udevd.service... Feb 9 09:54:42.044604 systemd-udevd[476]: Using default interface naming scheme 'v252'. Feb 9 09:54:42.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:42.050828 systemd[1]: Started systemd-udevd.service. Feb 9 09:54:42.090702 dracut-pre-trigger[488]: rd.md=0: removing MD RAID activation Feb 9 09:54:42.067237 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 09:54:42.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:42.094403 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 09:54:42.107682 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:54:42.156653 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:54:42.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:42.185563 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 09:54:42.187561 kernel: libata version 3.00 loaded. Feb 9 09:54:42.187586 kernel: ACPI: bus type USB registered Feb 9 09:54:42.222587 kernel: usbcore: registered new interface driver usbfs Feb 9 09:54:42.222627 kernel: usbcore: registered new interface driver hub Feb 9 09:54:42.257920 kernel: usbcore: registered new device driver usb Feb 9 09:54:42.258562 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 09:54:42.275558 kernel: AES CTR mode by8 optimization enabled Feb 9 09:54:42.309180 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 09:54:42.309199 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 09:54:42.346557 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 09:54:42.346658 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Feb 9 09:54:42.346721 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 09:54:42.366791 kernel: pps pps0: new PPS source ptp0 Feb 9 09:54:42.396798 kernel: igb 0000:04:00.0: added PHC on eth0 Feb 9 09:54:42.396877 kernel: scsi host0: ahci Feb 9 09:54:42.396897 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 09:54:42.426966 kernel: scsi host1: ahci Feb 9 09:54:42.426991 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:ac:4e Feb 9 09:54:42.457600 kernel: scsi host2: ahci Feb 9 09:54:42.470459 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Feb 9 09:54:42.470570 kernel: scsi host3: ahci Feb 9 09:54:42.473557 kernel: mlx5_core 0000:02:00.0: firmware version: 14.28.2006 Feb 9 09:54:42.473678 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 09:54:42.497781 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 09:54:42.512934 kernel: scsi host4: ahci Feb 9 09:54:42.570054 kernel: pps pps1: new PPS source ptp1 Feb 9 09:54:42.570133 kernel: scsi host5: ahci Feb 9 09:54:42.570150 kernel: igb 0000:05:00.0: added PHC on eth1 Feb 9 09:54:42.592270 kernel: scsi host6: ahci Feb 9 09:54:42.592295 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 09:54:42.616770 kernel: scsi host7: ahci Feb 9 09:54:42.616794 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:ac:4f Feb 9 09:54:42.641990 kernel: ata1: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516100 irq 129 Feb 9 09:54:42.657477 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Feb 9 09:54:42.657550 kernel: ata2: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516180 irq 129 Feb 9 09:54:42.670720 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 09:54:42.686567 kernel: ata3: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516200 irq 129 Feb 9 09:54:42.735373 kernel: ata4: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516280 irq 129 Feb 9 09:54:42.735392 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 09:54:42.735466 kernel: ata5: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516300 irq 129 Feb 9 09:54:42.788487 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 09:54:42.788571 kernel: ata6: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516380 irq 129 Feb 9 09:54:42.823245 kernel: ata7: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516400 irq 129 Feb 9 09:54:42.823261 kernel: ata8: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516480 irq 129 Feb 9 09:54:43.076638 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 09:54:43.125829 kernel: mlx5_core 0000:02:00.1: firmware version: 14.28.2006 Feb 9 09:54:43.125972 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 09:54:43.168586 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 09:54:43.168604 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 09:54:43.183559 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 09:54:43.198591 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 09:54:43.213595 kernel: ata8: SATA link down (SStatus 0 SControl 300) Feb 9 09:54:43.228592 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 09:54:43.243583 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 09:54:43.259555 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 09:54:43.274584 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 09:54:43.291589 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 09:54:43.339944 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 09:54:43.339960 kernel: ata2.00: Features: NCQ-prio Feb 9 09:54:43.339967 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 09:54:43.375828 kernel: ata1.00: Features: NCQ-prio Feb 9 09:54:43.393584 kernel: ata2.00: configured for UDMA/133 Feb 9 09:54:43.393599 kernel: ata1.00: configured for UDMA/133 Feb 9 09:54:43.407591 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 09:54:43.407664 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 09:54:43.442599 kernel: port_module: 9 callbacks suppressed Feb 9 09:54:43.442615 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Feb 9 09:54:43.442708 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 09:54:43.472574 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 09:54:43.539600 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 09:54:43.539709 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Feb 9 09:54:43.539765 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 09:54:43.576609 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 09:54:43.606417 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 09:54:43.606486 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 09:54:43.606495 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 09:54:43.606546 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 09:54:43.638223 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 09:54:43.638299 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 09:54:43.638382 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 09:54:43.638454 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 9 09:54:43.638525 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 9 09:54:43.638594 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 09:54:43.638655 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 09:54:43.638709 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 09:54:43.640597 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 09:54:43.640619 kernel: GPT:9289727 != 937703087 Feb 9 09:54:43.640632 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 09:54:43.640644 kernel: GPT:9289727 != 937703087 Feb 9 09:54:43.640654 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 09:54:43.640665 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 09:54:43.640676 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 09:54:43.640686 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 9 09:54:43.672247 kernel: hub 1-0:1.0: USB hub found Feb 9 09:54:43.672331 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 09:54:43.672394 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 09:54:43.690615 kernel: hub 1-0:1.0: 16 ports detected Feb 9 09:54:43.690691 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Feb 9 09:54:43.696624 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 09:54:43.703773 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 09:54:43.718557 kernel: hub 2-0:1.0: USB hub found Feb 9 09:54:43.749821 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 09:54:43.749898 kernel: hub 2-0:1.0: 10 ports detected Feb 9 09:54:43.779616 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 09:54:43.779631 kernel: usb: port power management may be unreliable Feb 9 09:54:43.807557 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 09:54:43.958819 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 09:54:43.958846 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 09:54:44.084590 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Feb 9 09:54:44.096094 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 09:54:44.183801 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Feb 9 09:54:44.183881 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (536) Feb 9 09:54:44.183890 kernel: hub 1-14:1.0: USB hub found Feb 9 09:54:44.183957 kernel: hub 1-14:1.0: 4 ports detected Feb 9 09:54:44.164621 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 09:54:44.176568 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 09:54:44.203213 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 09:54:44.229688 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:54:44.244979 systemd[1]: Starting disk-uuid.service... Feb 9 09:54:44.289712 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 09:54:44.289750 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 09:54:44.289897 disk-uuid[694]: Primary Header is updated. Feb 9 09:54:44.289897 disk-uuid[694]: Secondary Entries is updated. Feb 9 09:54:44.289897 disk-uuid[694]: Secondary Header is updated. Feb 9 09:54:44.341600 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 09:54:44.341627 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 09:54:44.416562 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 09:54:44.569612 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 09:54:44.603557 kernel: usbcore: registered new interface driver usbhid Feb 9 09:54:44.603616 kernel: usbhid: USB HID core driver Feb 9 09:54:44.637728 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 09:54:44.754295 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 09:54:44.754452 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 09:54:44.754460 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 09:54:45.318478 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 09:54:45.337564 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 09:54:45.337600 disk-uuid[695]: The operation has completed successfully. Feb 9 09:54:45.377990 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 09:54:45.473112 kernel: audit: type=1130 audit(1707472485.384:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.473128 kernel: audit: type=1131 audit(1707472485.384:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.378047 systemd[1]: Finished disk-uuid.service. Feb 9 09:54:45.502791 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 09:54:45.385275 systemd[1]: Starting verity-setup.service... Feb 9 09:54:45.553134 systemd[1]: Found device dev-mapper-usr.device. Feb 9 09:54:45.562526 systemd[1]: Mounting sysusr-usr.mount... Feb 9 09:54:45.576779 systemd[1]: Finished verity-setup.service. Feb 9 09:54:45.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.638559 kernel: audit: type=1130 audit(1707472485.592:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.667212 systemd[1]: Mounted sysusr-usr.mount. Feb 9 09:54:45.680863 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 09:54:45.673860 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 09:54:45.777856 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 09:54:45.777872 kernel: BTRFS info (device sdb6): using free space tree Feb 9 09:54:45.777880 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 09:54:45.777890 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 09:54:45.674254 systemd[1]: Starting ignition-setup.service... Feb 9 09:54:45.696312 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 09:54:45.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.786004 systemd[1]: Finished ignition-setup.service. Feb 9 09:54:45.909379 kernel: audit: type=1130 audit(1707472485.802:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.909394 kernel: audit: type=1130 audit(1707472485.859:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.802894 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 09:54:45.941938 kernel: audit: type=1334 audit(1707472485.918:24): prog-id=9 op=LOAD Feb 9 09:54:45.918000 audit: BPF prog-id=9 op=LOAD Feb 9 09:54:45.860228 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 09:54:45.920169 systemd[1]: Starting systemd-networkd.service... Feb 9 09:54:45.956288 systemd-networkd[878]: lo: Link UP Feb 9 09:54:45.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.990087 ignition[869]: Ignition 2.14.0 Feb 9 09:54:46.035799 kernel: audit: type=1130 audit(1707472485.970:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.956291 systemd-networkd[878]: lo: Gained carrier Feb 9 09:54:45.990091 ignition[869]: Stage: fetch-offline Feb 9 09:54:46.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.956613 systemd-networkd[878]: Enumeration completed Feb 9 09:54:46.180152 kernel: audit: type=1130 audit(1707472486.046:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:46.180165 kernel: audit: type=1130 audit(1707472486.106:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:46.180175 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 09:54:46.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.990117 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:46.214791 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Feb 9 09:54:45.956684 systemd[1]: Started systemd-networkd.service. Feb 9 09:54:45.990134 ignition[869]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 09:54:45.957329 systemd-networkd[878]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:54:46.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.997141 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 09:54:45.970693 systemd[1]: Reached target network.target. Feb 9 09:54:46.273739 iscsid[907]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:54:46.273739 iscsid[907]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 09:54:46.273739 iscsid[907]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 09:54:46.273739 iscsid[907]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 09:54:46.273739 iscsid[907]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 09:54:46.273739 iscsid[907]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:54:46.273739 iscsid[907]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 09:54:46.442756 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 9 09:54:46.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:46.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:45.997208 ignition[869]: parsed url from cmdline: "" Feb 9 09:54:46.013546 unknown[869]: fetched base config from "system" Feb 9 09:54:45.997210 ignition[869]: no config URL provided Feb 9 09:54:46.013550 unknown[869]: fetched user config from "system" Feb 9 09:54:45.997213 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:54:46.030263 systemd[1]: Starting iscsiuio.service... Feb 9 09:54:45.997241 ignition[869]: parsing config with SHA512: 6e13887287af0688ce72c798bf01a7e7127de4b706c29262737808c4027d5668f4ef147c1808ff303f32b63ad61af67ea066b296f36873d4e25abb074724ad1c Feb 9 09:54:46.035923 systemd[1]: Started iscsiuio.service. Feb 9 09:54:46.013932 ignition[869]: fetch-offline: fetch-offline passed Feb 9 09:54:46.046906 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 09:54:46.013935 ignition[869]: POST message to Packet Timeline Feb 9 09:54:46.106802 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 09:54:46.013939 ignition[869]: POST Status error: resource requires networking Feb 9 09:54:46.107248 systemd[1]: Starting ignition-kargs.service... Feb 9 09:54:46.013970 ignition[869]: Ignition finished successfully Feb 9 09:54:46.181804 systemd-networkd[878]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:54:46.184633 ignition[896]: Ignition 2.14.0 Feb 9 09:54:46.194365 systemd[1]: Starting iscsid.service... Feb 9 09:54:46.184636 ignition[896]: Stage: kargs Feb 9 09:54:46.221693 systemd[1]: Started iscsid.service. Feb 9 09:54:46.184692 ignition[896]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:46.237048 systemd[1]: Starting dracut-initqueue.service... Feb 9 09:54:46.184702 ignition[896]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 09:54:46.256752 systemd[1]: Finished dracut-initqueue.service. Feb 9 09:54:46.185964 ignition[896]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 09:54:46.281666 systemd[1]: Reached target remote-fs-pre.target. Feb 9 09:54:46.187882 ignition[896]: kargs: kargs passed Feb 9 09:54:46.292834 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:54:46.187886 ignition[896]: POST message to Packet Timeline Feb 9 09:54:46.334833 systemd[1]: Reached target remote-fs.target. Feb 9 09:54:46.187896 ignition[896]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 09:54:46.357354 systemd[1]: Starting dracut-pre-mount.service... Feb 9 09:54:46.193918 ignition[896]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:41985->[::1]:53: read: connection refused Feb 9 09:54:46.386867 systemd[1]: Finished dracut-pre-mount.service. Feb 9 09:54:46.394394 ignition[896]: GET https://metadata.packet.net/metadata: attempt #2 Feb 9 09:54:46.424150 systemd-networkd[878]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:54:46.395041 ignition[896]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:39915->[::1]:53: read: connection refused Feb 9 09:54:46.453374 systemd-networkd[878]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:54:46.483885 systemd-networkd[878]: enp2s0f1np1: Link UP Feb 9 09:54:46.484296 systemd-networkd[878]: enp2s0f1np1: Gained carrier Feb 9 09:54:46.494043 systemd-networkd[878]: enp2s0f0np0: Link UP Feb 9 09:54:46.494405 systemd-networkd[878]: eno2: Link UP Feb 9 09:54:46.494762 systemd-networkd[878]: eno1: Link UP Feb 9 09:54:46.795201 ignition[896]: GET https://metadata.packet.net/metadata: attempt #3 Feb 9 09:54:46.796333 ignition[896]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43271->[::1]:53: read: connection refused Feb 9 09:54:47.210057 systemd-networkd[878]: enp2s0f0np0: Gained carrier Feb 9 09:54:47.219819 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Feb 9 09:54:47.245790 systemd-networkd[878]: enp2s0f0np0: DHCPv4 address 139.178.90.113/31, gateway 139.178.90.112 acquired from 145.40.83.140 Feb 9 09:54:47.507049 systemd-networkd[878]: enp2s0f1np1: Gained IPv6LL Feb 9 09:54:47.596931 ignition[896]: GET https://metadata.packet.net/metadata: attempt #4 Feb 9 09:54:47.598348 ignition[896]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:48969->[::1]:53: read: connection refused Feb 9 09:54:48.723033 systemd-networkd[878]: enp2s0f0np0: Gained IPv6LL Feb 9 09:54:49.198813 ignition[896]: GET https://metadata.packet.net/metadata: attempt #5 Feb 9 09:54:49.200353 ignition[896]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:53265->[::1]:53: read: connection refused Feb 9 09:54:52.403467 ignition[896]: GET https://metadata.packet.net/metadata: attempt #6 Feb 9 09:54:52.443545 ignition[896]: GET result: OK Feb 9 09:54:52.636541 ignition[896]: Ignition finished successfully Feb 9 09:54:52.641180 systemd[1]: Finished ignition-kargs.service. Feb 9 09:54:52.729044 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 09:54:52.729077 kernel: audit: type=1130 audit(1707472492.651:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:52.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:52.660245 ignition[926]: Ignition 2.14.0 Feb 9 09:54:52.653898 systemd[1]: Starting ignition-disks.service... Feb 9 09:54:52.660249 ignition[926]: Stage: disks Feb 9 09:54:52.660303 ignition[926]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:52.660314 ignition[926]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 09:54:52.661618 ignition[926]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 09:54:52.663206 ignition[926]: disks: disks passed Feb 9 09:54:52.663210 ignition[926]: POST message to Packet Timeline Feb 9 09:54:52.663220 ignition[926]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 09:54:52.691549 ignition[926]: GET result: OK Feb 9 09:54:52.900057 ignition[926]: Ignition finished successfully Feb 9 09:54:52.903580 systemd[1]: Finished ignition-disks.service. Feb 9 09:54:52.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:52.916112 systemd[1]: Reached target initrd-root-device.target. Feb 9 09:54:53.002800 kernel: audit: type=1130 audit(1707472492.915:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:52.988744 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:54:52.988781 systemd[1]: Reached target local-fs.target. Feb 9 09:54:53.010773 systemd[1]: Reached target sysinit.target. Feb 9 09:54:53.024765 systemd[1]: Reached target basic.target. Feb 9 09:54:53.038456 systemd[1]: Starting systemd-fsck-root.service... Feb 9 09:54:53.058490 systemd-fsck[943]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 09:54:53.072093 systemd[1]: Finished systemd-fsck-root.service. Feb 9 09:54:53.167659 kernel: audit: type=1130 audit(1707472493.081:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.167676 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 09:54:53.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.087416 systemd[1]: Mounting sysroot.mount... Feb 9 09:54:53.176264 systemd[1]: Mounted sysroot.mount. Feb 9 09:54:53.189820 systemd[1]: Reached target initrd-root-fs.target. Feb 9 09:54:53.211338 systemd[1]: Mounting sysroot-usr.mount... Feb 9 09:54:53.219353 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 09:54:53.234092 systemd[1]: Starting flatcar-static-network.service... Feb 9 09:54:53.249644 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 09:54:53.249682 systemd[1]: Reached target ignition-diskful.target. Feb 9 09:54:53.268648 systemd[1]: Mounted sysroot-usr.mount. Feb 9 09:54:53.291728 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:54:53.306325 systemd[1]: Starting initrd-setup-root.service... Feb 9 09:54:53.445597 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (954) Feb 9 09:54:53.445617 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 09:54:53.445626 kernel: BTRFS info (device sdb6): using free space tree Feb 9 09:54:53.445633 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 09:54:53.445640 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 09:54:53.445647 initrd-setup-root[961]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 09:54:53.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.508779 coreos-metadata[950]: Feb 09 09:54:53.376 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 09:54:53.508779 coreos-metadata[950]: Feb 09 09:54:53.399 INFO Fetch successful Feb 9 09:54:53.508779 coreos-metadata[950]: Feb 09 09:54:53.417 INFO wrote hostname ci-3510.3.2-a-b0ed76e28d to /sysroot/etc/hostname Feb 9 09:54:53.715806 kernel: audit: type=1130 audit(1707472493.453:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.715821 kernel: audit: type=1130 audit(1707472493.516:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.715829 kernel: audit: type=1130 audit(1707472493.580:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.715836 kernel: audit: type=1131 audit(1707472493.580:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.370816 systemd[1]: Finished initrd-setup-root.service. Feb 9 09:54:53.730661 coreos-metadata[951]: Feb 09 09:54:53.376 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 09:54:53.730661 coreos-metadata[951]: Feb 09 09:54:53.399 INFO Fetch successful Feb 9 09:54:53.749799 initrd-setup-root[969]: cut: /sysroot/etc/group: No such file or directory Feb 9 09:54:53.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.454886 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 09:54:53.830775 kernel: audit: type=1130 audit(1707472493.765:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.830802 initrd-setup-root[977]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 09:54:53.516852 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 9 09:54:53.852763 initrd-setup-root[985]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 09:54:53.516891 systemd[1]: Finished flatcar-static-network.service. Feb 9 09:54:53.871822 ignition[1028]: INFO : Ignition 2.14.0 Feb 9 09:54:53.871822 ignition[1028]: INFO : Stage: mount Feb 9 09:54:53.871822 ignition[1028]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:53.871822 ignition[1028]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 09:54:53.871822 ignition[1028]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 09:54:53.871822 ignition[1028]: INFO : mount: mount passed Feb 9 09:54:53.871822 ignition[1028]: INFO : POST message to Packet Timeline Feb 9 09:54:53.871822 ignition[1028]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 09:54:53.871822 ignition[1028]: INFO : GET result: OK Feb 9 09:54:53.580815 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:54:53.702127 systemd[1]: Starting ignition-mount.service... Feb 9 09:54:53.974853 ignition[1028]: INFO : Ignition finished successfully Feb 9 09:54:53.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.723109 systemd[1]: Starting sysroot-boot.service... Feb 9 09:54:54.055642 kernel: audit: type=1130 audit(1707472493.983:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:53.737988 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 09:54:54.104641 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1045) Feb 9 09:54:54.104681 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 09:54:53.738028 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 09:54:53.740605 systemd[1]: Finished sysroot-boot.service. Feb 9 09:54:54.172629 kernel: BTRFS info (device sdb6): using free space tree Feb 9 09:54:54.172655 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 09:54:54.172674 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 09:54:53.970002 systemd[1]: Finished ignition-mount.service. Feb 9 09:54:53.985778 systemd[1]: Starting ignition-files.service... Feb 9 09:54:54.050341 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:54:54.185789 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:54:54.216726 unknown[1064]: wrote ssh authorized keys file for user: core Feb 9 09:54:54.229773 ignition[1064]: INFO : Ignition 2.14.0 Feb 9 09:54:54.229773 ignition[1064]: INFO : Stage: files Feb 9 09:54:54.229773 ignition[1064]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:54.229773 ignition[1064]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 09:54:54.229773 ignition[1064]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 09:54:54.229773 ignition[1064]: DEBUG : files: compiled without relabeling support, skipping Feb 9 09:54:54.229773 ignition[1064]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 09:54:54.229773 ignition[1064]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 09:54:54.229773 ignition[1064]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 09:54:54.229773 ignition[1064]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 09:54:54.229773 ignition[1064]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 09:54:54.229773 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 09:54:54.229773 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 09:54:54.487943 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 09:54:54.549767 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 09:54:54.549767 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 09:54:54.584760 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 09:54:55.070026 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 09:54:55.149499 ignition[1064]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 09:54:55.149499 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 09:54:55.192779 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 09:54:55.192779 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 09:54:55.570888 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 09:54:55.627007 ignition[1064]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 09:54:55.627007 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 09:54:55.669789 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:54:55.669789 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 09:54:55.724476 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 09:54:55.860407 ignition[1064]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 09:54:55.860407 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:54:55.901778 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:54:55.901778 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 09:54:55.934632 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 09:54:56.278870 ignition[1064]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 09:54:56.278870 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:54:56.278870 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 09:54:56.343657 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 9 09:54:56.343657 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 09:54:56.461366 ignition[1064]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 09:54:56.495661 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2346534678" Feb 9 09:54:56.755881 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1067) Feb 9 09:54:56.753638 systemd[1]: Finished ignition-files.service. Feb 9 09:54:56.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.822157 ignition[1064]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2346534678": device or resource busy Feb 9 09:54:56.822157 ignition[1064]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2346534678", trying btrfs: device or resource busy Feb 9 09:54:56.822157 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2346534678" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2346534678" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem2346534678" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2346534678" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: op(14): [started] processing unit "packet-phone-home.service" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: op(14): [finished] processing unit "packet-phone-home.service" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Feb 9 09:54:56.822157 ignition[1064]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:54:57.204871 kernel: audit: type=1130 audit(1707472496.763:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.770375 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(1b): [started] setting preset to enabled for "packet-phone-home.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(1b): [finished] setting preset to enabled for "packet-phone-home.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(1d): [started] setting preset to enabled for "prepare-critools.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(1d): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-helm.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(1f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 09:54:57.222080 ignition[1064]: INFO : files: op(1f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 09:54:57.222080 ignition[1064]: INFO : files: createResultFile: createFiles: op(20): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: createResultFile: createFiles: op(20): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:54:57.222080 ignition[1064]: INFO : files: files passed Feb 9 09:54:57.222080 ignition[1064]: INFO : POST message to Packet Timeline Feb 9 09:54:57.222080 ignition[1064]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 09:54:57.222080 ignition[1064]: INFO : GET result: OK Feb 9 09:54:57.222080 ignition[1064]: INFO : Ignition finished successfully Feb 9 09:54:57.764819 kernel: kauditd_printk_skb: 12 callbacks suppressed Feb 9 09:54:57.764837 kernel: audit: type=1131 audit(1707472497.667:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.830782 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 09:54:57.794870 iscsid[907]: iscsid shutting down. Feb 9 09:54:57.860655 kernel: audit: type=1131 audit(1707472497.802:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.831178 systemd[1]: Starting ignition-quench.service... Feb 9 09:54:57.874773 initrd-setup-root-after-ignition[1099]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 09:54:57.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.851092 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 09:54:58.008873 kernel: audit: type=1131 audit(1707472497.882:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.008891 kernel: audit: type=1131 audit(1707472497.950:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.887069 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 09:54:58.072913 kernel: audit: type=1131 audit(1707472498.015:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.887151 systemd[1]: Finished ignition-quench.service. Feb 9 09:54:58.141376 kernel: audit: type=1131 audit(1707472498.081:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.912078 systemd[1]: Reached target ignition-complete.target. Feb 9 09:54:58.209071 kernel: audit: type=1131 audit(1707472498.148:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.938708 systemd[1]: Starting initrd-parse-etc.service... Feb 9 09:54:56.979474 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 09:54:58.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.293569 kernel: audit: type=1131 audit(1707472498.233:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.979538 systemd[1]: Finished initrd-parse-etc.service. Feb 9 09:54:58.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.360143 ignition[1114]: INFO : Ignition 2.14.0 Feb 9 09:54:58.360143 ignition[1114]: INFO : Stage: umount Feb 9 09:54:58.360143 ignition[1114]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:58.360143 ignition[1114]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 09:54:58.360143 ignition[1114]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 09:54:58.360143 ignition[1114]: INFO : umount: umount passed Feb 9 09:54:58.360143 ignition[1114]: INFO : POST message to Packet Timeline Feb 9 09:54:58.360143 ignition[1114]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 09:54:58.360143 ignition[1114]: INFO : GET result: OK Feb 9 09:54:58.360143 ignition[1114]: INFO : Ignition finished successfully Feb 9 09:54:58.563826 kernel: audit: type=1131 audit(1707472498.301:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.563901 kernel: audit: type=1131 audit(1707472498.368:62): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:56.996918 systemd[1]: Reached target initrd-fs.target. Feb 9 09:54:57.008944 systemd[1]: Reached target initrd.target. Feb 9 09:54:58.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.027139 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 09:54:58.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.602000 audit: BPF prog-id=6 op=UNLOAD Feb 9 09:54:57.029064 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 09:54:57.059139 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 09:54:57.075066 systemd[1]: Starting initrd-cleanup.service... Feb 9 09:54:58.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.110474 systemd[1]: Stopped target nss-lookup.target. Feb 9 09:54:58.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.121260 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 09:54:58.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.148294 systemd[1]: Stopped target timers.target. Feb 9 09:54:57.168220 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 09:54:58.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.168595 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 09:54:57.188506 systemd[1]: Stopped target initrd.target. Feb 9 09:54:57.212248 systemd[1]: Stopped target basic.target. Feb 9 09:54:58.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.229228 systemd[1]: Stopped target ignition-complete.target. Feb 9 09:54:58.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.255237 systemd[1]: Stopped target ignition-diskful.target. Feb 9 09:54:58.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.275243 systemd[1]: Stopped target initrd-root-device.target. Feb 9 09:54:57.295269 systemd[1]: Stopped target remote-fs.target. Feb 9 09:54:58.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.321221 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 09:54:58.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:58.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.348242 systemd[1]: Stopped target sysinit.target. Feb 9 09:54:57.368275 systemd[1]: Stopped target local-fs.target. Feb 9 09:54:57.389242 systemd[1]: Stopped target local-fs-pre.target. Feb 9 09:54:57.412220 systemd[1]: Stopped target swap.target. Feb 9 09:54:57.434116 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 09:54:57.434473 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 09:54:57.457440 systemd[1]: Stopped target cryptsetup.target. Feb 9 09:54:57.479149 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 09:54:57.479505 systemd[1]: Stopped dracut-initqueue.service. Feb 9 09:54:57.501404 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 09:54:57.501777 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 09:54:57.522449 systemd[1]: Stopped target paths.target. Feb 9 09:54:57.543097 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 09:54:57.546766 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 09:54:57.567254 systemd[1]: Stopped target slices.target. Feb 9 09:54:57.588237 systemd[1]: Stopped target sockets.target. Feb 9 09:54:58.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:57.612236 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 09:54:57.612631 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 09:54:57.637321 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 09:54:57.637682 systemd[1]: Stopped ignition-files.service. Feb 9 09:54:57.652335 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 09:54:57.652711 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 09:54:57.670449 systemd[1]: Stopping ignition-mount.service... Feb 9 09:54:57.757981 systemd[1]: Stopping iscsid.service... Feb 9 09:54:57.777797 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 09:54:57.777979 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 09:54:57.803597 systemd[1]: Stopping sysroot-boot.service... Feb 9 09:54:57.867760 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 09:54:57.867895 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 09:54:57.882971 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 09:54:57.883043 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 09:54:57.952261 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 09:54:57.952613 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 09:54:57.952656 systemd[1]: Stopped iscsid.service. Feb 9 09:54:58.016146 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 09:54:58.016184 systemd[1]: Stopped ignition-mount.service. Feb 9 09:54:58.082053 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 09:54:58.082090 systemd[1]: Stopped sysroot-boot.service. Feb 9 09:54:58.149083 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 09:54:59.080576 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Feb 9 09:54:58.149126 systemd[1]: Closed iscsid.socket. Feb 9 09:54:58.215799 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 09:54:58.215821 systemd[1]: Stopped ignition-disks.service. Feb 9 09:54:58.233895 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 09:54:58.233931 systemd[1]: Stopped ignition-kargs.service. Feb 9 09:54:58.301779 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 09:54:58.301807 systemd[1]: Stopped ignition-setup.service. Feb 9 09:54:58.388750 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 09:54:58.388806 systemd[1]: Stopped initrd-setup-root.service. Feb 9 09:54:58.435899 systemd[1]: Stopping iscsiuio.service... Feb 9 09:54:58.459053 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 09:54:58.459109 systemd[1]: Stopped iscsiuio.service. Feb 9 09:54:58.480230 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 09:54:58.480288 systemd[1]: Finished initrd-cleanup.service. Feb 9 09:54:58.511846 systemd[1]: Stopped target network.target. Feb 9 09:54:58.518911 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 09:54:58.518980 systemd[1]: Closed iscsiuio.socket. Feb 9 09:54:58.536161 systemd[1]: Stopping systemd-networkd.service... Feb 9 09:54:58.541666 systemd-networkd[878]: enp2s0f0np0: DHCPv6 lease lost Feb 9 09:54:58.556070 systemd[1]: Stopping systemd-resolved.service... Feb 9 09:54:58.556771 systemd-networkd[878]: enp2s0f1np1: DHCPv6 lease lost Feb 9 09:54:58.571486 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 09:54:59.080000 audit: BPF prog-id=9 op=UNLOAD Feb 9 09:54:58.571740 systemd[1]: Stopped systemd-resolved.service. Feb 9 09:54:58.587899 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 09:54:58.588137 systemd[1]: Stopped systemd-networkd.service. Feb 9 09:54:58.602589 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 09:54:58.602681 systemd[1]: Closed systemd-networkd.socket. Feb 9 09:54:58.622247 systemd[1]: Stopping network-cleanup.service... Feb 9 09:54:58.635767 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 09:54:58.635899 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 09:54:58.650898 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 09:54:58.651013 systemd[1]: Stopped systemd-sysctl.service. Feb 9 09:54:58.666268 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 09:54:58.666399 systemd[1]: Stopped systemd-modules-load.service. Feb 9 09:54:58.682171 systemd[1]: Stopping systemd-udevd.service... Feb 9 09:54:58.701644 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 09:54:58.702939 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 09:54:58.703002 systemd[1]: Stopped systemd-udevd.service. Feb 9 09:54:58.713852 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 09:54:58.713875 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 09:54:58.728734 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 09:54:58.728758 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 09:54:58.743670 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 09:54:58.743714 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 09:54:58.755786 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 09:54:58.755874 systemd[1]: Stopped dracut-cmdline.service. Feb 9 09:54:58.771884 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 09:54:58.771994 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 09:54:58.789843 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 09:54:58.803590 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 09:54:58.803620 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 09:54:58.818830 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 09:54:58.818888 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 09:54:58.957303 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 09:54:58.957518 systemd[1]: Stopped network-cleanup.service. Feb 9 09:54:58.967042 systemd[1]: Reached target initrd-switch-root.target. Feb 9 09:54:58.984242 systemd[1]: Starting initrd-switch-root.service... Feb 9 09:54:59.022193 systemd[1]: Switching root. Feb 9 09:54:59.082691 systemd-journald[268]: Journal stopped Feb 9 09:55:02.953851 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 09:55:02.953866 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 09:55:02.953874 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 09:55:02.953879 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 09:55:02.953885 kernel: SELinux: policy capability open_perms=1 Feb 9 09:55:02.953890 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 09:55:02.953896 kernel: SELinux: policy capability always_check_network=0 Feb 9 09:55:02.953902 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 09:55:02.953908 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 09:55:02.953913 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 09:55:02.953918 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 09:55:02.953924 systemd[1]: Successfully loaded SELinux policy in 322.703ms. Feb 9 09:55:02.953933 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.904ms. Feb 9 09:55:02.953945 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:55:02.953955 systemd[1]: Detected architecture x86-64. Feb 9 09:55:02.953961 systemd[1]: Detected first boot. Feb 9 09:55:02.953967 systemd[1]: Hostname set to . Feb 9 09:55:02.953973 systemd[1]: Initializing machine ID from random generator. Feb 9 09:55:02.953979 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 09:55:02.953986 systemd[1]: Populated /etc with preset unit settings. Feb 9 09:55:02.953992 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:55:02.953998 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:55:02.954005 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:55:02.954011 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 09:55:02.954017 systemd[1]: Stopped initrd-switch-root.service. Feb 9 09:55:02.954023 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 09:55:02.954030 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 09:55:02.954037 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 09:55:02.954043 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 09:55:02.954049 systemd[1]: Created slice system-getty.slice. Feb 9 09:55:02.954055 systemd[1]: Created slice system-modprobe.slice. Feb 9 09:55:02.954061 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 09:55:02.954067 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 09:55:02.954073 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 09:55:02.954080 systemd[1]: Created slice user.slice. Feb 9 09:55:02.954086 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:55:02.954092 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 09:55:02.954098 systemd[1]: Set up automount boot.automount. Feb 9 09:55:02.954104 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 09:55:02.954110 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 09:55:02.954117 systemd[1]: Stopped target initrd-fs.target. Feb 9 09:55:02.954124 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 09:55:02.954130 systemd[1]: Reached target integritysetup.target. Feb 9 09:55:02.954138 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:55:02.954158 systemd[1]: Reached target remote-fs.target. Feb 9 09:55:02.954164 systemd[1]: Reached target slices.target. Feb 9 09:55:02.954170 systemd[1]: Reached target swap.target. Feb 9 09:55:02.954176 systemd[1]: Reached target torcx.target. Feb 9 09:55:02.954182 systemd[1]: Reached target veritysetup.target. Feb 9 09:55:02.954189 systemd[1]: Listening on systemd-coredump.socket. Feb 9 09:55:02.954195 systemd[1]: Listening on systemd-initctl.socket. Feb 9 09:55:02.954202 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:55:02.954209 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:55:02.954215 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:55:02.954221 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 09:55:02.954228 systemd[1]: Mounting dev-hugepages.mount... Feb 9 09:55:02.954235 systemd[1]: Mounting dev-mqueue.mount... Feb 9 09:55:02.954241 systemd[1]: Mounting media.mount... Feb 9 09:55:02.954247 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 09:55:02.954254 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 09:55:02.954260 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 09:55:02.954266 systemd[1]: Mounting tmp.mount... Feb 9 09:55:02.954273 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 09:55:02.954279 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 09:55:02.954286 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:55:02.954292 systemd[1]: Starting modprobe@configfs.service... Feb 9 09:55:02.954299 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 09:55:02.954305 systemd[1]: Starting modprobe@drm.service... Feb 9 09:55:02.954311 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 09:55:02.954318 systemd[1]: Starting modprobe@fuse.service... Feb 9 09:55:02.954324 kernel: fuse: init (API version 7.34) Feb 9 09:55:02.954330 systemd[1]: Starting modprobe@loop.service... Feb 9 09:55:02.954336 kernel: loop: module loaded Feb 9 09:55:02.954343 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 09:55:02.954349 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 09:55:02.954356 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 09:55:02.954362 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 09:55:02.954368 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 09:55:02.954374 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 9 09:55:02.954380 kernel: audit: type=1131 audit(1707472502.683:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:02.954386 systemd[1]: Stopped systemd-journald.service. Feb 9 09:55:02.954394 kernel: audit: type=1130 audit(1707472502.757:116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:02.954399 kernel: audit: type=1131 audit(1707472502.757:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:02.954405 kernel: audit: type=1334 audit(1707472502.839:118): prog-id=21 op=LOAD Feb 9 09:55:02.954411 kernel: audit: type=1334 audit(1707472502.856:119): prog-id=22 op=LOAD Feb 9 09:55:02.954416 kernel: audit: type=1334 audit(1707472502.873:120): prog-id=23 op=LOAD Feb 9 09:55:02.954422 kernel: audit: type=1334 audit(1707472502.890:121): prog-id=19 op=UNLOAD Feb 9 09:55:02.954428 systemd[1]: Starting systemd-journald.service... Feb 9 09:55:02.954434 kernel: audit: type=1334 audit(1707472502.890:122): prog-id=20 op=UNLOAD Feb 9 09:55:02.954441 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:55:02.954447 kernel: audit: type=1305 audit(1707472502.951:123): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 09:55:02.954455 systemd-journald[1262]: Journal started Feb 9 09:55:02.954479 systemd-journald[1262]: Runtime Journal (/run/log/journal/dcd9c4fddc444910b7433560120b4517) is 8.0M, max 639.3M, 631.3M free. Feb 9 09:54:59.503000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 09:54:59.772000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 09:54:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:54:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:54:59.774000 audit: BPF prog-id=10 op=LOAD Feb 9 09:54:59.774000 audit: BPF prog-id=10 op=UNLOAD Feb 9 09:54:59.774000 audit: BPF prog-id=11 op=LOAD Feb 9 09:54:59.774000 audit: BPF prog-id=11 op=UNLOAD Feb 9 09:54:59.843000 audit[1153]: AVC avc: denied { associate } for pid=1153 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 09:54:59.843000 audit[1153]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0002498a2 a1=c0001c8df8 a2=c0001d10c0 a3=32 items=0 ppid=1136 pid=1153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:59.843000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:54:59.870000 audit[1153]: AVC avc: denied { associate } for pid=1153 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 09:54:59.870000 audit[1153]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000249979 a2=1ed a3=0 items=2 ppid=1136 pid=1153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:59.870000 audit: CWD cwd="/" Feb 9 09:54:59.870000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:59.870000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:59.870000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:55:01.391000 audit: BPF prog-id=12 op=LOAD Feb 9 09:55:01.391000 audit: BPF prog-id=3 op=UNLOAD Feb 9 09:55:01.391000 audit: BPF prog-id=13 op=LOAD Feb 9 09:55:01.392000 audit: BPF prog-id=14 op=LOAD Feb 9 09:55:01.392000 audit: BPF prog-id=4 op=UNLOAD Feb 9 09:55:01.392000 audit: BPF prog-id=5 op=UNLOAD Feb 9 09:55:01.392000 audit: BPF prog-id=15 op=LOAD Feb 9 09:55:01.392000 audit: BPF prog-id=12 op=UNLOAD Feb 9 09:55:01.392000 audit: BPF prog-id=16 op=LOAD Feb 9 09:55:01.393000 audit: BPF prog-id=17 op=LOAD Feb 9 09:55:01.393000 audit: BPF prog-id=13 op=UNLOAD Feb 9 09:55:01.393000 audit: BPF prog-id=14 op=UNLOAD Feb 9 09:55:01.393000 audit: BPF prog-id=18 op=LOAD Feb 9 09:55:01.393000 audit: BPF prog-id=15 op=UNLOAD Feb 9 09:55:01.393000 audit: BPF prog-id=19 op=LOAD Feb 9 09:55:01.393000 audit: BPF prog-id=20 op=LOAD Feb 9 09:55:01.393000 audit: BPF prog-id=16 op=UNLOAD Feb 9 09:55:01.393000 audit: BPF prog-id=17 op=UNLOAD Feb 9 09:55:01.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:01.442000 audit: BPF prog-id=18 op=UNLOAD Feb 9 09:55:01.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:01.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:02.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:02.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:02.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:02.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:02.839000 audit: BPF prog-id=21 op=LOAD Feb 9 09:55:02.856000 audit: BPF prog-id=22 op=LOAD Feb 9 09:55:02.873000 audit: BPF prog-id=23 op=LOAD Feb 9 09:55:02.890000 audit: BPF prog-id=19 op=UNLOAD Feb 9 09:55:02.890000 audit: BPF prog-id=20 op=UNLOAD Feb 9 09:55:02.951000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 09:54:59.842535 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:55:01.390668 systemd[1]: Queued start job for default target multi-user.target. Feb 9 09:54:59.842934 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:55:01.394400 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 09:54:59.842948 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:54:59.842969 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 09:54:59.842976 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 09:54:59.842996 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 09:54:59.843005 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 09:54:59.843135 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 09:54:59.843162 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:54:59.843171 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:54:59.843606 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 09:54:59.843631 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 09:54:59.843644 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 09:54:59.843654 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 09:54:59.843665 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 09:54:59.843674 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:54:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 09:55:01.039334 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:55:01Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:55:01.039479 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:55:01Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:55:01.039531 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:55:01Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:55:01.039626 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:55:01Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:55:01.039657 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:55:01Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 09:55:01.039692 /usr/lib/systemd/system-generators/torcx-generator[1153]: time="2024-02-09T09:55:01Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 09:55:02.951000 audit[1262]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffd5d6d600 a2=4000 a3=7fffd5d6d69c items=0 ppid=1 pid=1262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:02.951000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 09:55:03.003609 kernel: audit: type=1300 audit(1707472502.951:123): arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffd5d6d600 a2=4000 a3=7fffd5d6d69c items=0 ppid=1 pid=1262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:03.099602 systemd[1]: Starting systemd-network-generator.service... Feb 9 09:55:03.127740 systemd[1]: Starting systemd-remount-fs.service... Feb 9 09:55:03.153610 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:55:03.196791 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 09:55:03.196813 systemd[1]: Stopped verity-setup.service. Feb 9 09:55:03.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.242612 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 09:55:03.242633 systemd[1]: Started systemd-journald.service. Feb 9 09:55:03.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.270067 systemd[1]: Mounted dev-hugepages.mount. Feb 9 09:55:03.277903 systemd[1]: Mounted dev-mqueue.mount. Feb 9 09:55:03.284811 systemd[1]: Mounted media.mount. Feb 9 09:55:03.291818 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 09:55:03.300798 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 09:55:03.309787 systemd[1]: Mounted tmp.mount. Feb 9 09:55:03.316878 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 09:55:03.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.325921 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:55:03.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.334947 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 09:55:03.335071 systemd[1]: Finished modprobe@configfs.service. Feb 9 09:55:03.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.344048 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 09:55:03.344205 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 09:55:03.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.353123 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 09:55:03.353316 systemd[1]: Finished modprobe@drm.service. Feb 9 09:55:03.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.362382 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 09:55:03.362691 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 09:55:03.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.371387 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 09:55:03.371706 systemd[1]: Finished modprobe@fuse.service. Feb 9 09:55:03.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.380350 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 09:55:03.380667 systemd[1]: Finished modprobe@loop.service. Feb 9 09:55:03.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.389374 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:55:03.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.398342 systemd[1]: Finished systemd-network-generator.service. Feb 9 09:55:03.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.407340 systemd[1]: Finished systemd-remount-fs.service. Feb 9 09:55:03.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.416344 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:55:03.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.426039 systemd[1]: Reached target network-pre.target. Feb 9 09:55:03.437422 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 09:55:03.449363 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 09:55:03.456785 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 09:55:03.457721 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 09:55:03.465134 systemd[1]: Starting systemd-journal-flush.service... Feb 9 09:55:03.468676 systemd-journald[1262]: Time spent on flushing to /var/log/journal/dcd9c4fddc444910b7433560120b4517 is 15.817ms for 1655 entries. Feb 9 09:55:03.468676 systemd-journald[1262]: System Journal (/var/log/journal/dcd9c4fddc444910b7433560120b4517) is 8.0M, max 195.6M, 187.6M free. Feb 9 09:55:03.508906 systemd-journald[1262]: Received client request to flush runtime journal. Feb 9 09:55:03.481650 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 09:55:03.482152 systemd[1]: Starting systemd-random-seed.service... Feb 9 09:55:03.497699 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 09:55:03.498211 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:55:03.506329 systemd[1]: Starting systemd-sysusers.service... Feb 9 09:55:03.514239 systemd[1]: Starting systemd-udev-settle.service... Feb 9 09:55:03.522705 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 09:55:03.530733 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 09:55:03.538796 systemd[1]: Finished systemd-journal-flush.service. Feb 9 09:55:03.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.546811 systemd[1]: Finished systemd-random-seed.service. Feb 9 09:55:03.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.554761 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:55:03.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.562749 systemd[1]: Finished systemd-sysusers.service. Feb 9 09:55:03.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.571762 systemd[1]: Reached target first-boot-complete.target. Feb 9 09:55:03.579896 udevadm[1278]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 09:55:03.762461 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 09:55:03.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.770000 audit: BPF prog-id=24 op=LOAD Feb 9 09:55:03.770000 audit: BPF prog-id=25 op=LOAD Feb 9 09:55:03.770000 audit: BPF prog-id=7 op=UNLOAD Feb 9 09:55:03.770000 audit: BPF prog-id=8 op=UNLOAD Feb 9 09:55:03.771828 systemd[1]: Starting systemd-udevd.service... Feb 9 09:55:03.783630 systemd-udevd[1279]: Using default interface naming scheme 'v252'. Feb 9 09:55:03.802216 systemd[1]: Started systemd-udevd.service. Feb 9 09:55:03.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:03.812668 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 09:55:03.812000 audit: BPF prog-id=26 op=LOAD Feb 9 09:55:03.813915 systemd[1]: Starting systemd-networkd.service... Feb 9 09:55:03.839000 audit: BPF prog-id=27 op=LOAD Feb 9 09:55:03.857976 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 09:55:03.858042 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 09:55:03.858068 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1288) Feb 9 09:55:03.882548 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 09:55:03.903000 audit: BPF prog-id=28 op=LOAD Feb 9 09:55:03.903000 audit: BPF prog-id=29 op=LOAD Feb 9 09:55:03.904272 systemd[1]: Starting systemd-userdbd.service... Feb 9 09:55:03.904558 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 09:55:03.923559 kernel: ACPI: button: Power Button [PWRF] Feb 9 09:55:03.854000 audit[1350]: AVC avc: denied { confidentiality } for pid=1350 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 09:55:03.962422 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:55:03.962583 kernel: IPMI message handler: version 39.2 Feb 9 09:55:03.987663 systemd[1]: Started systemd-userdbd.service. Feb 9 09:55:04.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:04.009561 kernel: ipmi device interface Feb 9 09:55:03.854000 audit[1350]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559caa364bd0 a1=4d8bc a2=7f24b0741bc5 a3=5 items=42 ppid=1279 pid=1350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:03.854000 audit: CWD cwd="/" Feb 9 09:55:03.854000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=1 name=(null) inode=18954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=2 name=(null) inode=18954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=3 name=(null) inode=18955 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=4 name=(null) inode=18954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=5 name=(null) inode=18956 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=6 name=(null) inode=18954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=7 name=(null) inode=18957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=8 name=(null) inode=18957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=9 name=(null) inode=18958 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=10 name=(null) inode=18957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=11 name=(null) inode=18959 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=12 name=(null) inode=18957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=13 name=(null) inode=18960 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=14 name=(null) inode=18957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=15 name=(null) inode=18961 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=16 name=(null) inode=18957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=17 name=(null) inode=18962 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=18 name=(null) inode=18954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=19 name=(null) inode=18963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=20 name=(null) inode=18963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=21 name=(null) inode=18964 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=22 name=(null) inode=18963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=23 name=(null) inode=18965 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=24 name=(null) inode=18963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=25 name=(null) inode=18966 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=26 name=(null) inode=18963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=27 name=(null) inode=18967 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=28 name=(null) inode=18963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=29 name=(null) inode=18968 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=30 name=(null) inode=18954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=31 name=(null) inode=18969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=32 name=(null) inode=18969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=33 name=(null) inode=18970 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=34 name=(null) inode=18969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=35 name=(null) inode=18971 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=36 name=(null) inode=18969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=37 name=(null) inode=18972 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=38 name=(null) inode=18969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=39 name=(null) inode=18973 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=40 name=(null) inode=18969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PATH item=41 name=(null) inode=18974 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:55:03.854000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 09:55:04.044358 kernel: ipmi_si: IPMI System Interface driver Feb 9 09:55:04.044404 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 09:55:04.044497 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 09:55:04.044589 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 09:55:04.105585 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 09:55:04.105689 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 09:55:04.165824 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 09:55:04.185363 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 09:55:04.185468 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 09:55:04.211558 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 09:55:04.211583 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 09:55:04.211664 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 09:55:04.310123 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 09:55:04.310277 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 09:55:04.310291 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 09:55:04.312471 systemd-networkd[1320]: bond0: netdev ready Feb 9 09:55:04.314518 systemd-networkd[1320]: lo: Link UP Feb 9 09:55:04.314520 systemd-networkd[1320]: lo: Gained carrier Feb 9 09:55:04.314992 systemd-networkd[1320]: Enumeration completed Feb 9 09:55:04.315088 systemd[1]: Started systemd-networkd.service. Feb 9 09:55:04.315273 systemd-networkd[1320]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 09:55:04.315852 systemd-networkd[1320]: enp2s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:8f:96:97.network. Feb 9 09:55:04.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:04.357609 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Feb 9 09:55:04.357695 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 09:55:04.424560 kernel: intel_rapl_common: Found RAPL domain package Feb 9 09:55:04.424607 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Feb 9 09:55:04.424687 kernel: intel_rapl_common: Found RAPL domain core Feb 9 09:55:04.424698 kernel: intel_rapl_common: Found RAPL domain uncore Feb 9 09:55:04.424707 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 09:55:04.465560 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 09:55:04.532638 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Feb 9 09:55:04.532668 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 09:55:04.532681 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 09:55:04.542674 systemd-networkd[1320]: enp2s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:8f:96:96.network. Feb 9 09:55:04.609559 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 09:55:04.707735 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 09:55:04.764684 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 9 09:55:04.786593 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Feb 9 09:55:04.805605 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 09:55:04.808028 systemd-networkd[1320]: bond0: Link UP Feb 9 09:55:04.808279 systemd-networkd[1320]: enp2s0f1np1: Link UP Feb 9 09:55:04.808477 systemd-networkd[1320]: enp2s0f0np0: Link UP Feb 9 09:55:04.808646 systemd-networkd[1320]: enp2s0f1np1: Gained carrier Feb 9 09:55:04.809868 systemd-networkd[1320]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:8f:96:96.network. Feb 9 09:55:04.846921 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 09:55:04.846983 kernel: bond0: active interface up! Feb 9 09:55:04.878581 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 09:55:04.895803 systemd[1]: Finished systemd-udev-settle.service. Feb 9 09:55:04.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:04.904307 systemd[1]: Starting lvm2-activation-early.service... Feb 9 09:55:04.919525 lvm[1382]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:55:04.948974 systemd[1]: Finished lvm2-activation-early.service. Feb 9 09:55:04.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:04.957680 systemd[1]: Reached target cryptsetup.target. Feb 9 09:55:04.966200 systemd[1]: Starting lvm2-activation.service... Feb 9 09:55:04.968152 lvm[1383]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:55:05.000558 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.023557 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.045558 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.045947 systemd[1]: Finished lvm2-activation.service. Feb 9 09:55:05.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:05.063670 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:55:05.069622 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.086672 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 09:55:05.086685 systemd[1]: Reached target local-fs.target. Feb 9 09:55:05.092558 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.109663 systemd[1]: Reached target machines.target. Feb 9 09:55:05.114585 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.132255 systemd[1]: Starting ldconfig.service... Feb 9 09:55:05.136586 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.157560 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.157535 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 09:55:05.157560 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:55:05.158076 systemd[1]: Starting systemd-boot-update.service... Feb 9 09:55:05.174074 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 09:55:05.179558 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.198145 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 09:55:05.199911 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:55:05.199931 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:55:05.200416 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 09:55:05.200557 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.200619 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1386 (bootctl) Feb 9 09:55:05.201243 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 09:55:05.222633 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.238941 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 09:55:05.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:05.243612 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.264559 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.284618 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.304642 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.323602 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.324103 systemd-networkd[1320]: bond0: Gained carrier Feb 9 09:55:05.324192 systemd-networkd[1320]: enp2s0f0np0: Gained carrier Feb 9 09:55:05.355825 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 09:55:05.355853 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Feb 9 09:55:05.367026 systemd-networkd[1320]: enp2s0f1np1: Link DOWN Feb 9 09:55:05.367029 systemd-networkd[1320]: enp2s0f1np1: Lost carrier Feb 9 09:55:05.426953 systemd-tmpfiles[1390]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 09:55:05.539325 systemd-tmpfiles[1390]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 09:55:05.543556 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 09:55:05.560574 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Feb 9 09:55:05.561170 systemd-networkd[1320]: enp2s0f1np1: Link UP Feb 9 09:55:05.561322 systemd-networkd[1320]: enp2s0f1np1: Gained carrier Feb 9 09:55:05.578611 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Feb 9 09:55:05.595635 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 09:55:05.682266 systemd-tmpfiles[1390]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 09:55:05.689558 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 09:55:05.689869 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 09:55:05.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:05.720599 systemd-fsck[1394]: fsck.fat 4.2 (2021-01-31) Feb 9 09:55:05.720599 systemd-fsck[1394]: /dev/sdb1: 789 files, 115332/258078 clusters Feb 9 09:55:05.721262 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 09:55:05.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:05.733376 systemd[1]: Mounting boot.mount... Feb 9 09:55:05.745708 systemd[1]: Mounted boot.mount. Feb 9 09:55:05.764186 systemd[1]: Finished systemd-boot-update.service. Feb 9 09:55:05.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:05.792022 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 09:55:05.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:05.800334 systemd[1]: Starting audit-rules.service... Feb 9 09:55:05.808202 systemd[1]: Starting clean-ca-certificates.service... Feb 9 09:55:05.818225 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 09:55:05.819000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 09:55:05.819000 audit[1414]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf72931c0 a2=420 a3=0 items=0 ppid=1397 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:05.819000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 09:55:05.820663 augenrules[1414]: No rules Feb 9 09:55:05.828561 systemd[1]: Starting systemd-resolved.service... Feb 9 09:55:05.837445 systemd[1]: Starting systemd-timesyncd.service... Feb 9 09:55:05.845057 systemd[1]: Starting systemd-update-utmp.service... Feb 9 09:55:05.852840 systemd[1]: Finished audit-rules.service. Feb 9 09:55:05.859705 systemd[1]: Finished clean-ca-certificates.service. Feb 9 09:55:05.867688 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 09:55:05.878735 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 09:55:05.879415 systemd[1]: Finished systemd-update-utmp.service. Feb 9 09:55:05.904555 systemd[1]: Started systemd-timesyncd.service. Feb 9 09:55:05.907879 systemd-resolved[1419]: Positive Trust Anchors: Feb 9 09:55:05.907886 systemd-resolved[1419]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:55:05.907904 systemd-resolved[1419]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:55:05.912010 systemd-resolved[1419]: Using system hostname 'ci-3510.3.2-a-b0ed76e28d'. Feb 9 09:55:05.912674 systemd[1]: Reached target time-set.target. Feb 9 09:55:05.913407 ldconfig[1385]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 09:55:05.920622 systemd[1]: Started systemd-resolved.service. Feb 9 09:55:05.928702 systemd[1]: Finished ldconfig.service. Feb 9 09:55:05.935620 systemd[1]: Reached target network.target. Feb 9 09:55:05.943582 systemd[1]: Reached target nss-lookup.target. Feb 9 09:55:05.952198 systemd[1]: Starting systemd-update-done.service... Feb 9 09:55:05.958719 systemd[1]: Finished systemd-update-done.service. Feb 9 09:55:05.966641 systemd[1]: Reached target sysinit.target. Feb 9 09:55:05.974622 systemd[1]: Started motdgen.path. Feb 9 09:55:05.981598 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 09:55:05.990649 systemd[1]: Started logrotate.timer. Feb 9 09:55:05.997620 systemd[1]: Started mdadm.timer. Feb 9 09:55:06.004585 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 09:55:06.012581 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 09:55:06.012595 systemd[1]: Reached target paths.target. Feb 9 09:55:06.019581 systemd[1]: Reached target timers.target. Feb 9 09:55:06.026704 systemd[1]: Listening on dbus.socket. Feb 9 09:55:06.034005 systemd[1]: Starting docker.socket... Feb 9 09:55:06.041859 systemd[1]: Listening on sshd.socket. Feb 9 09:55:06.048640 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:55:06.048847 systemd[1]: Listening on docker.socket. Feb 9 09:55:06.055623 systemd[1]: Reached target sockets.target. Feb 9 09:55:06.063581 systemd[1]: Reached target basic.target. Feb 9 09:55:06.070603 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:55:06.070615 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:55:06.071036 systemd[1]: Starting containerd.service... Feb 9 09:55:06.077974 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 09:55:06.086045 systemd[1]: Starting coreos-metadata.service... Feb 9 09:55:06.093062 systemd[1]: Starting dbus.service... Feb 9 09:55:06.099153 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 09:55:06.104730 jq[1435]: false Feb 9 09:55:06.106255 systemd[1]: Starting extend-filesystems.service... Feb 9 09:55:06.110497 coreos-metadata[1428]: Feb 09 09:55:06.110 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 09:55:06.112652 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 09:55:06.113242 systemd[1]: Starting motdgen.service... Feb 9 09:55:06.114970 dbus-daemon[1434]: [system] SELinux support is enabled Feb 9 09:55:06.115400 extend-filesystems[1436]: Found sda Feb 9 09:55:06.133157 extend-filesystems[1436]: Found sdb Feb 9 09:55:06.133157 extend-filesystems[1436]: Found sdb1 Feb 9 09:55:06.133157 extend-filesystems[1436]: Found sdb2 Feb 9 09:55:06.133157 extend-filesystems[1436]: Found sdb3 Feb 9 09:55:06.133157 extend-filesystems[1436]: Found usr Feb 9 09:55:06.133157 extend-filesystems[1436]: Found sdb4 Feb 9 09:55:06.133157 extend-filesystems[1436]: Found sdb6 Feb 9 09:55:06.133157 extend-filesystems[1436]: Found sdb7 Feb 9 09:55:06.133157 extend-filesystems[1436]: Found sdb9 Feb 9 09:55:06.133157 extend-filesystems[1436]: Checking size of /dev/sdb9 Feb 9 09:55:06.133157 extend-filesystems[1436]: Resized partition /dev/sdb9 Feb 9 09:55:06.250641 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 9 09:55:06.120422 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 09:55:06.250712 coreos-metadata[1431]: Feb 09 09:55:06.118 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 09:55:06.250841 extend-filesystems[1453]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 09:55:06.148276 systemd[1]: Starting prepare-critools.service... Feb 9 09:55:06.167224 systemd[1]: Starting prepare-helm.service... Feb 9 09:55:06.185096 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 09:55:06.199047 systemd[1]: Starting sshd-keygen.service... Feb 9 09:55:06.213848 systemd[1]: Starting systemd-logind.service... Feb 9 09:55:06.230624 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:55:06.231123 systemd[1]: Starting tcsd.service... Feb 9 09:55:06.234488 systemd-logind[1465]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 09:55:06.271496 jq[1468]: true Feb 9 09:55:06.234498 systemd-logind[1465]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 09:55:06.234509 systemd-logind[1465]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 09:55:06.234627 systemd-logind[1465]: New seat seat0. Feb 9 09:55:06.242918 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 09:55:06.243264 systemd[1]: Starting update-engine.service... Feb 9 09:55:06.263405 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 09:55:06.278934 systemd[1]: Started dbus.service. Feb 9 09:55:06.287392 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 09:55:06.287475 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 09:55:06.287665 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 09:55:06.287754 systemd[1]: Finished motdgen.service. Feb 9 09:55:06.289718 update_engine[1467]: I0209 09:55:06.289337 1467 main.cc:92] Flatcar Update Engine starting Feb 9 09:55:06.292670 update_engine[1467]: I0209 09:55:06.292660 1467 update_check_scheduler.cc:74] Next update check in 10m5s Feb 9 09:55:06.295743 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 09:55:06.295832 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 09:55:06.300008 tar[1470]: ./ Feb 9 09:55:06.300008 tar[1470]: ./macvlan Feb 9 09:55:06.306373 jq[1476]: true Feb 9 09:55:06.306532 dbus-daemon[1434]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 09:55:06.307694 tar[1471]: crictl Feb 9 09:55:06.308996 tar[1472]: linux-amd64/helm Feb 9 09:55:06.312189 systemd[1]: Started systemd-logind.service. Feb 9 09:55:06.318541 env[1477]: time="2024-02-09T09:55:06.318509377Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 09:55:06.320815 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 09:55:06.320904 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 09:55:06.321776 tar[1470]: ./static Feb 9 09:55:06.326529 systemd[1]: Started update-engine.service. Feb 9 09:55:06.327941 env[1477]: time="2024-02-09T09:55:06.327924060Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 09:55:06.328613 env[1477]: time="2024-02-09T09:55:06.328599323Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:55:06.329278 env[1477]: time="2024-02-09T09:55:06.329210614Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:55:06.329278 env[1477]: time="2024-02-09T09:55:06.329231310Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:55:06.330837 env[1477]: time="2024-02-09T09:55:06.330819842Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:55:06.330872 env[1477]: time="2024-02-09T09:55:06.330838660Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 09:55:06.330872 env[1477]: time="2024-02-09T09:55:06.330851176Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 09:55:06.330872 env[1477]: time="2024-02-09T09:55:06.330861143Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 09:55:06.332802 env[1477]: time="2024-02-09T09:55:06.332788531Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:55:06.332910 bash[1500]: Updated "/home/core/.ssh/authorized_keys" Feb 9 09:55:06.333023 env[1477]: time="2024-02-09T09:55:06.332956387Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:55:06.333067 env[1477]: time="2024-02-09T09:55:06.333051835Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:55:06.333096 env[1477]: time="2024-02-09T09:55:06.333067194Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 09:55:06.333121 env[1477]: time="2024-02-09T09:55:06.333104175Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 09:55:06.333121 env[1477]: time="2024-02-09T09:55:06.333115376Z" level=info msg="metadata content store policy set" policy=shared Feb 9 09:55:06.334768 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 09:55:06.339585 env[1477]: time="2024-02-09T09:55:06.339571609Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 09:55:06.339620 env[1477]: time="2024-02-09T09:55:06.339590960Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 09:55:06.339620 env[1477]: time="2024-02-09T09:55:06.339603616Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 09:55:06.339675 env[1477]: time="2024-02-09T09:55:06.339626875Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 09:55:06.339675 env[1477]: time="2024-02-09T09:55:06.339639848Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 09:55:06.339675 env[1477]: time="2024-02-09T09:55:06.339652216Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 09:55:06.339675 env[1477]: time="2024-02-09T09:55:06.339663087Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 09:55:06.339766 env[1477]: time="2024-02-09T09:55:06.339676420Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 09:55:06.339766 env[1477]: time="2024-02-09T09:55:06.339689848Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 09:55:06.339766 env[1477]: time="2024-02-09T09:55:06.339707218Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 09:55:06.339766 env[1477]: time="2024-02-09T09:55:06.339721610Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 09:55:06.339766 env[1477]: time="2024-02-09T09:55:06.339736364Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 09:55:06.339883 env[1477]: time="2024-02-09T09:55:06.339801100Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 09:55:06.339883 env[1477]: time="2024-02-09T09:55:06.339862665Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 09:55:06.340061 env[1477]: time="2024-02-09T09:55:06.340049908Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 09:55:06.340092 env[1477]: time="2024-02-09T09:55:06.340072314Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 09:55:06.340092 env[1477]: time="2024-02-09T09:55:06.340084992Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 09:55:06.340139 env[1477]: time="2024-02-09T09:55:06.340119693Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 09:55:06.340139 env[1477]: time="2024-02-09T09:55:06.340131819Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 09:55:06.340188 env[1477]: time="2024-02-09T09:55:06.340144135Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 09:55:06.340188 env[1477]: time="2024-02-09T09:55:06.340154763Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 09:55:06.340188 env[1477]: time="2024-02-09T09:55:06.340165559Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 09:55:06.340188 env[1477]: time="2024-02-09T09:55:06.340175272Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 09:55:06.340188 env[1477]: time="2024-02-09T09:55:06.340184380Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 09:55:06.340367 env[1477]: time="2024-02-09T09:55:06.340193950Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 09:55:06.340367 env[1477]: time="2024-02-09T09:55:06.340212475Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 09:55:06.340367 env[1477]: time="2024-02-09T09:55:06.340298637Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 09:55:06.340367 env[1477]: time="2024-02-09T09:55:06.340311650Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 09:55:06.340367 env[1477]: time="2024-02-09T09:55:06.340322944Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 09:55:06.340367 env[1477]: time="2024-02-09T09:55:06.340333128Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 09:55:06.340367 env[1477]: time="2024-02-09T09:55:06.340345415Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 09:55:06.340367 env[1477]: time="2024-02-09T09:55:06.340355249Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 09:55:06.340558 env[1477]: time="2024-02-09T09:55:06.340369696Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 09:55:06.340558 env[1477]: time="2024-02-09T09:55:06.340395605Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 09:55:06.340617 env[1477]: time="2024-02-09T09:55:06.340564031Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 09:55:06.342492 env[1477]: time="2024-02-09T09:55:06.340619834Z" level=info msg="Connect containerd service" Feb 9 09:55:06.342492 env[1477]: time="2024-02-09T09:55:06.340642614Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 09:55:06.342492 env[1477]: time="2024-02-09T09:55:06.341023568Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 09:55:06.342492 env[1477]: time="2024-02-09T09:55:06.341114640Z" level=info msg="Start subscribing containerd event" Feb 9 09:55:06.342492 env[1477]: time="2024-02-09T09:55:06.341154680Z" level=info msg="Start recovering state" Feb 9 09:55:06.342492 env[1477]: time="2024-02-09T09:55:06.341183138Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 09:55:06.342492 env[1477]: time="2024-02-09T09:55:06.341190067Z" level=info msg="Start event monitor" Feb 9 09:55:06.342492 env[1477]: time="2024-02-09T09:55:06.341219239Z" level=info msg="Start snapshots syncer" Feb 9 09:55:06.342492 env[1477]: time="2024-02-09T09:55:06.341219793Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 09:55:06.342492 env[1477]: time="2024-02-09T09:55:06.341227812Z" level=info msg="Start cni network conf syncer for default" Feb 9 09:55:06.342492 env[1477]: time="2024-02-09T09:55:06.341257066Z" level=info msg="containerd successfully booted in 0.023430s" Feb 9 09:55:06.342492 env[1477]: time="2024-02-09T09:55:06.341523449Z" level=info msg="Start streaming server" Feb 9 09:55:06.344693 systemd[1]: Started containerd.service. Feb 9 09:55:06.346365 tar[1470]: ./vlan Feb 9 09:55:06.353750 systemd[1]: Started locksmithd.service. Feb 9 09:55:06.360726 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 09:55:06.360857 systemd[1]: Reached target system-config.target. Feb 9 09:55:06.366478 tar[1470]: ./portmap Feb 9 09:55:06.368689 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 09:55:06.368805 systemd[1]: Reached target user-config.target. Feb 9 09:55:06.385536 tar[1470]: ./host-local Feb 9 09:55:06.386639 systemd-networkd[1320]: bond0: Gained IPv6LL Feb 9 09:55:06.402331 tar[1470]: ./vrf Feb 9 09:55:06.416643 locksmithd[1513]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 09:55:06.420456 tar[1470]: ./bridge Feb 9 09:55:06.442135 tar[1470]: ./tuning Feb 9 09:55:06.459442 tar[1470]: ./firewall Feb 9 09:55:06.481852 tar[1470]: ./host-device Feb 9 09:55:06.501377 tar[1470]: ./sbr Feb 9 09:55:06.519267 tar[1470]: ./loopback Feb 9 09:55:06.536228 tar[1470]: ./dhcp Feb 9 09:55:06.560755 tar[1472]: linux-amd64/LICENSE Feb 9 09:55:06.560843 tar[1472]: linux-amd64/README.md Feb 9 09:55:06.563311 systemd[1]: Finished prepare-helm.service. Feb 9 09:55:06.574216 systemd[1]: Finished prepare-critools.service. Feb 9 09:55:06.585375 tar[1470]: ./ptp Feb 9 09:55:06.606415 tar[1470]: ./ipvlan Feb 9 09:55:06.626722 tar[1470]: ./bandwidth Feb 9 09:55:06.651464 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 09:55:06.664557 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 9 09:55:06.692076 extend-filesystems[1453]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 9 09:55:06.692076 extend-filesystems[1453]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 09:55:06.692076 extend-filesystems[1453]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 9 09:55:06.728603 extend-filesystems[1436]: Resized filesystem in /dev/sdb9 Feb 9 09:55:06.692436 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 09:55:06.692514 systemd[1]: Finished extend-filesystems.service. Feb 9 09:55:06.875610 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 09:55:06.888383 sshd_keygen[1464]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 09:55:06.899935 systemd[1]: Finished sshd-keygen.service. Feb 9 09:55:06.907704 systemd[1]: Starting issuegen.service... Feb 9 09:55:06.914964 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 09:55:06.915035 systemd[1]: Finished issuegen.service. Feb 9 09:55:06.922496 systemd[1]: Starting systemd-user-sessions.service... Feb 9 09:55:06.930843 systemd[1]: Finished systemd-user-sessions.service. Feb 9 09:55:06.939313 systemd[1]: Started getty@tty1.service. Feb 9 09:55:06.946345 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 09:55:06.954751 systemd[1]: Reached target getty.target. Feb 9 09:55:11.969535 login[1540]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 09:55:11.975782 login[1537]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 09:55:11.976724 systemd[1]: Created slice user-500.slice. Feb 9 09:55:11.977335 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 09:55:11.978229 systemd-logind[1465]: New session 1 of user core. Feb 9 09:55:11.979905 systemd-logind[1465]: New session 2 of user core. Feb 9 09:55:11.982367 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 09:55:11.983048 systemd[1]: Starting user@500.service... Feb 9 09:55:11.985035 (systemd)[1542]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:12.051743 systemd[1542]: Queued start job for default target default.target. Feb 9 09:55:12.051967 systemd[1542]: Reached target paths.target. Feb 9 09:55:12.051979 systemd[1542]: Reached target sockets.target. Feb 9 09:55:12.051986 systemd[1542]: Reached target timers.target. Feb 9 09:55:12.051993 systemd[1542]: Reached target basic.target. Feb 9 09:55:12.052010 systemd[1542]: Reached target default.target. Feb 9 09:55:12.052024 systemd[1542]: Startup finished in 63ms. Feb 9 09:55:12.052073 systemd[1]: Started user@500.service. Feb 9 09:55:12.052608 systemd[1]: Started session-1.scope. Feb 9 09:55:12.052955 systemd[1]: Started session-2.scope. Feb 9 09:55:12.083161 coreos-metadata[1428]: Feb 09 09:55:12.083 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 09:55:12.083323 coreos-metadata[1431]: Feb 09 09:55:12.083 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 09:55:12.921604 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Feb 9 09:55:12.929672 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 9 09:55:13.083589 coreos-metadata[1431]: Feb 09 09:55:13.083 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 09:55:13.084317 coreos-metadata[1428]: Feb 09 09:55:13.083 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 09:55:13.134094 coreos-metadata[1428]: Feb 09 09:55:13.133 INFO Fetch successful Feb 9 09:55:13.136114 coreos-metadata[1431]: Feb 09 09:55:13.136 INFO Fetch successful Feb 9 09:55:13.159641 systemd[1]: Finished coreos-metadata.service. Feb 9 09:55:13.160047 unknown[1428]: wrote ssh authorized keys file for user: core Feb 9 09:55:13.160367 systemd[1]: Started packet-phone-home.service. Feb 9 09:55:13.168118 curl[1564]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 09:55:13.168220 curl[1564]: Dload Upload Total Spent Left Speed Feb 9 09:55:13.171648 update-ssh-keys[1565]: Updated "/home/core/.ssh/authorized_keys" Feb 9 09:55:13.171844 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 09:55:13.172002 systemd[1]: Reached target multi-user.target. Feb 9 09:55:13.172589 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 09:55:13.176530 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 09:55:13.176670 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 09:55:13.176816 systemd[1]: Startup finished in 2.014s (kernel) + 19.329s (initrd) + 14.018s (userspace) = 35.362s. Feb 9 09:55:13.378645 curl[1564]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 09:55:13.381062 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 09:55:13.441857 systemd-timesyncd[1420]: Contacted time server 73.193.62.54:123 (0.flatcar.pool.ntp.org). Feb 9 09:55:13.442052 systemd-timesyncd[1420]: Initial clock synchronization to Fri 2024-02-09 09:55:13.448532 UTC. Feb 9 09:55:13.796902 systemd[1]: Created slice system-sshd.slice. Feb 9 09:55:13.797428 systemd[1]: Started sshd@0-139.178.90.113:22-147.75.109.163:56212.service. Feb 9 09:55:13.857644 sshd[1568]: Accepted publickey for core from 147.75.109.163 port 56212 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 09:55:13.858486 sshd[1568]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:13.861286 systemd-logind[1465]: New session 3 of user core. Feb 9 09:55:13.861894 systemd[1]: Started session-3.scope. Feb 9 09:55:13.913673 systemd[1]: Started sshd@1-139.178.90.113:22-147.75.109.163:56222.service. Feb 9 09:55:13.951162 sshd[1573]: Accepted publickey for core from 147.75.109.163 port 56222 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 09:55:13.951884 sshd[1573]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:13.954196 systemd-logind[1465]: New session 4 of user core. Feb 9 09:55:13.954607 systemd[1]: Started session-4.scope. Feb 9 09:55:14.005366 sshd[1573]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:14.007754 systemd[1]: sshd@1-139.178.90.113:22-147.75.109.163:56222.service: Deactivated successfully. Feb 9 09:55:14.008305 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 09:55:14.008915 systemd-logind[1465]: Session 4 logged out. Waiting for processes to exit. Feb 9 09:55:14.009816 systemd[1]: Started sshd@2-139.178.90.113:22-147.75.109.163:56230.service. Feb 9 09:55:14.010607 systemd-logind[1465]: Removed session 4. Feb 9 09:55:14.050548 sshd[1579]: Accepted publickey for core from 147.75.109.163 port 56230 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 09:55:14.051401 sshd[1579]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:14.054196 systemd-logind[1465]: New session 5 of user core. Feb 9 09:55:14.054758 systemd[1]: Started session-5.scope. Feb 9 09:55:14.106401 sshd[1579]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:14.107810 systemd[1]: sshd@2-139.178.90.113:22-147.75.109.163:56230.service: Deactivated successfully. Feb 9 09:55:14.108088 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 09:55:14.108403 systemd-logind[1465]: Session 5 logged out. Waiting for processes to exit. Feb 9 09:55:14.108898 systemd[1]: Started sshd@3-139.178.90.113:22-147.75.109.163:56242.service. Feb 9 09:55:14.109298 systemd-logind[1465]: Removed session 5. Feb 9 09:55:14.147327 sshd[1586]: Accepted publickey for core from 147.75.109.163 port 56242 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 09:55:14.148292 sshd[1586]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:14.151331 systemd-logind[1465]: New session 6 of user core. Feb 9 09:55:14.152001 systemd[1]: Started session-6.scope. Feb 9 09:55:14.207274 sshd[1586]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:14.208731 systemd[1]: sshd@3-139.178.90.113:22-147.75.109.163:56242.service: Deactivated successfully. Feb 9 09:55:14.209031 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 09:55:14.209383 systemd-logind[1465]: Session 6 logged out. Waiting for processes to exit. Feb 9 09:55:14.209898 systemd[1]: Started sshd@4-139.178.90.113:22-147.75.109.163:56254.service. Feb 9 09:55:14.210321 systemd-logind[1465]: Removed session 6. Feb 9 09:55:14.248492 sshd[1592]: Accepted publickey for core from 147.75.109.163 port 56254 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 09:55:14.249549 sshd[1592]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:14.252997 systemd-logind[1465]: New session 7 of user core. Feb 9 09:55:14.253771 systemd[1]: Started session-7.scope. Feb 9 09:55:14.344291 sudo[1595]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 09:55:14.344908 sudo[1595]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:55:14.361989 dbus-daemon[1434]: \xd0\xedb\u001f\xd1U: received setenforce notice (enforcing=545199328) Feb 9 09:55:14.366980 sudo[1595]: pam_unix(sudo:session): session closed for user root Feb 9 09:55:14.371857 sshd[1592]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:14.378757 systemd[1]: sshd@4-139.178.90.113:22-147.75.109.163:56254.service: Deactivated successfully. Feb 9 09:55:14.379417 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 09:55:14.379899 systemd-logind[1465]: Session 7 logged out. Waiting for processes to exit. Feb 9 09:55:14.380331 systemd[1]: Started sshd@5-139.178.90.113:22-147.75.109.163:56258.service. Feb 9 09:55:14.380730 systemd-logind[1465]: Removed session 7. Feb 9 09:55:14.418853 sshd[1599]: Accepted publickey for core from 147.75.109.163 port 56258 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 09:55:14.419710 sshd[1599]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:14.422329 systemd-logind[1465]: New session 8 of user core. Feb 9 09:55:14.422959 systemd[1]: Started session-8.scope. Feb 9 09:55:14.484287 sudo[1603]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 09:55:14.484894 sudo[1603]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:55:14.492086 sudo[1603]: pam_unix(sudo:session): session closed for user root Feb 9 09:55:14.500087 sudo[1602]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 09:55:14.500186 sudo[1602]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:55:14.505123 systemd[1]: Stopping audit-rules.service... Feb 9 09:55:14.504000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:55:14.505901 auditctl[1606]: No rules Feb 9 09:55:14.506068 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 09:55:14.506145 systemd[1]: Stopped audit-rules.service. Feb 9 09:55:14.506849 systemd[1]: Starting audit-rules.service... Feb 9 09:55:14.511230 kernel: kauditd_printk_skb: 94 callbacks suppressed Feb 9 09:55:14.511274 kernel: audit: type=1305 audit(1707472514.504:170): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:55:14.516399 augenrules[1623]: No rules Feb 9 09:55:14.516716 systemd[1]: Finished audit-rules.service. Feb 9 09:55:14.517115 sudo[1602]: pam_unix(sudo:session): session closed for user root Feb 9 09:55:14.517848 sshd[1599]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:14.519225 systemd[1]: sshd@5-139.178.90.113:22-147.75.109.163:56258.service: Deactivated successfully. Feb 9 09:55:14.519496 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 09:55:14.519842 systemd-logind[1465]: Session 8 logged out. Waiting for processes to exit. Feb 9 09:55:14.520325 systemd[1]: Started sshd@6-139.178.90.113:22-147.75.109.163:40382.service. Feb 9 09:55:14.520758 systemd-logind[1465]: Removed session 8. Feb 9 09:55:14.504000 audit[1606]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdcc2a8e90 a2=420 a3=0 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:14.557869 kernel: audit: type=1300 audit(1707472514.504:170): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdcc2a8e90 a2=420 a3=0 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:14.557921 kernel: audit: type=1327 audit(1707472514.504:170): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:55:14.504000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:55:14.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:14.589876 kernel: audit: type=1131 audit(1707472514.504:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:14.589918 kernel: audit: type=1130 audit(1707472514.515:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:14.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:14.590249 sshd[1629]: Accepted publickey for core from 147.75.109.163 port 40382 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 09:55:14.591880 sshd[1629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:14.593927 systemd-logind[1465]: New session 9 of user core. Feb 9 09:55:14.594332 systemd[1]: Started session-9.scope. Feb 9 09:55:14.515000 audit[1602]: USER_END pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:14.638342 kernel: audit: type=1106 audit(1707472514.515:173): pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:14.638388 kernel: audit: type=1104 audit(1707472514.515:174): pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:14.515000 audit[1602]: CRED_DISP pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:14.640792 sudo[1632]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 09:55:14.640898 sudo[1632]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:55:14.516000 audit[1599]: USER_END pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 09:55:14.694132 kernel: audit: type=1106 audit(1707472514.516:175): pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 09:55:14.694167 kernel: audit: type=1104 audit(1707472514.516:176): pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 09:55:14.516000 audit[1599]: CRED_DISP pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 09:55:14.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.90.113:22-147.75.109.163:56258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:14.745654 kernel: audit: type=1131 audit(1707472514.517:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.90.113:22-147.75.109.163:56258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:14.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.113:22-147.75.109.163:40382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:14.588000 audit[1629]: USER_ACCT pid=1629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 09:55:14.590000 audit[1629]: CRED_ACQ pid=1629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 09:55:14.590000 audit[1629]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd65873870 a2=3 a3=0 items=0 ppid=1 pid=1629 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:14.590000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:55:14.594000 audit[1629]: USER_START pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 09:55:14.595000 audit[1631]: CRED_ACQ pid=1631 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 09:55:14.639000 audit[1632]: USER_ACCT pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:14.639000 audit[1632]: CRED_REFR pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:14.640000 audit[1632]: USER_START pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:18.641781 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 09:55:18.645820 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 09:55:18.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:18.646009 systemd[1]: Reached target network-online.target. Feb 9 09:55:18.646705 systemd[1]: Starting docker.service... Feb 9 09:55:18.667179 env[1652]: time="2024-02-09T09:55:18.667116989Z" level=info msg="Starting up" Feb 9 09:55:18.667904 env[1652]: time="2024-02-09T09:55:18.667890071Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 09:55:18.667904 env[1652]: time="2024-02-09T09:55:18.667901132Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 09:55:18.667973 env[1652]: time="2024-02-09T09:55:18.667914092Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 09:55:18.667973 env[1652]: time="2024-02-09T09:55:18.667921885Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 09:55:18.669316 env[1652]: time="2024-02-09T09:55:18.669272242Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 09:55:18.669316 env[1652]: time="2024-02-09T09:55:18.669283087Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 09:55:18.669316 env[1652]: time="2024-02-09T09:55:18.669292470Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 09:55:18.669316 env[1652]: time="2024-02-09T09:55:18.669298655Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 09:55:18.707784 env[1652]: time="2024-02-09T09:55:18.707761939Z" level=info msg="Loading containers: start." Feb 9 09:55:18.738000 audit[1698]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.738000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff93213570 a2=0 a3=7fff9321355c items=0 ppid=1652 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.738000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 09:55:18.739000 audit[1700]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.739000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd4b5c0da0 a2=0 a3=7ffd4b5c0d8c items=0 ppid=1652 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.739000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 09:55:18.740000 audit[1702]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.740000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff61d9cf40 a2=0 a3=7fff61d9cf2c items=0 ppid=1652 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.740000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 09:55:18.741000 audit[1704]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.741000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff59d770e0 a2=0 a3=7fff59d770cc items=0 ppid=1652 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.741000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 09:55:18.743000 audit[1706]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.743000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeb3e659e0 a2=0 a3=7ffeb3e659cc items=0 ppid=1652 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 09:55:18.789000 audit[1711]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.789000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcb2d832e0 a2=0 a3=7ffcb2d832cc items=0 ppid=1652 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.789000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 09:55:18.800000 audit[1713]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.800000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdc704fb20 a2=0 a3=7ffdc704fb0c items=0 ppid=1652 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.800000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 09:55:18.805000 audit[1715]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.805000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe4c0857e0 a2=0 a3=7ffe4c0857cc items=0 ppid=1652 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.805000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 09:55:18.810000 audit[1717]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.810000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc3b2f4b10 a2=0 a3=7ffc3b2f4afc items=0 ppid=1652 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.810000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:18.824000 audit[1721]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.824000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffed8e30250 a2=0 a3=7ffed8e3023c items=0 ppid=1652 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.824000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:18.826000 audit[1722]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.826000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdf39d4860 a2=0 a3=7ffdf39d484c items=0 ppid=1652 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.826000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:18.849642 kernel: Initializing XFRM netlink socket Feb 9 09:55:18.908600 env[1652]: time="2024-02-09T09:55:18.908424271Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 09:55:18.947000 audit[1730]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.947000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe176508b0 a2=0 a3=7ffe1765089c items=0 ppid=1652 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.947000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 09:55:18.966000 audit[1733]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.966000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcf994a370 a2=0 a3=7ffcf994a35c items=0 ppid=1652 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 09:55:18.968000 audit[1736]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.968000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd44cfd950 a2=0 a3=7ffd44cfd93c items=0 ppid=1652 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.968000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 09:55:18.970000 audit[1738]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.970000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff73e02150 a2=0 a3=7fff73e0213c items=0 ppid=1652 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.970000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 09:55:18.972000 audit[1740]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.972000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffb9443ce0 a2=0 a3=7fffb9443ccc items=0 ppid=1652 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 09:55:18.974000 audit[1742]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.974000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffed6d23210 a2=0 a3=7ffed6d231fc items=0 ppid=1652 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.974000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 09:55:18.976000 audit[1744]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.976000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffabbfc7e0 a2=0 a3=7fffabbfc7cc items=0 ppid=1652 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.976000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 09:55:18.984000 audit[1747]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.984000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff9221a9d0 a2=0 a3=7fff9221a9bc items=0 ppid=1652 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.984000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 09:55:18.986000 audit[1749]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.986000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc9b3e83e0 a2=0 a3=7ffc9b3e83cc items=0 ppid=1652 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.986000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 09:55:18.988000 audit[1751]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.988000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcd3c398f0 a2=0 a3=7ffcd3c398dc items=0 ppid=1652 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.988000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 09:55:18.989000 audit[1753]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.989000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc2ac3f4d0 a2=0 a3=7ffc2ac3f4bc items=0 ppid=1652 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.989000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 09:55:18.990798 systemd-networkd[1320]: docker0: Link UP Feb 9 09:55:18.996000 audit[1757]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.996000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd0e12bd80 a2=0 a3=7ffd0e12bd6c items=0 ppid=1652 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:18.997000 audit[1758]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:18.997000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffa8775060 a2=0 a3=7fffa877504c items=0 ppid=1652 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:18.997000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:18.998224 env[1652]: time="2024-02-09T09:55:18.998173948Z" level=info msg="Loading containers: done." Feb 9 09:55:19.009937 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2317175875-merged.mount: Deactivated successfully. Feb 9 09:55:19.010501 env[1652]: time="2024-02-09T09:55:19.010429975Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 09:55:19.010805 env[1652]: time="2024-02-09T09:55:19.010736580Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 09:55:19.010938 env[1652]: time="2024-02-09T09:55:19.010906496Z" level=info msg="Daemon has completed initialization" Feb 9 09:55:19.034522 systemd[1]: Started docker.service. Feb 9 09:55:19.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:19.050742 env[1652]: time="2024-02-09T09:55:19.050596629Z" level=info msg="API listen on /run/docker.sock" Feb 9 09:55:19.101644 systemd[1]: Reloading. Feb 9 09:55:19.160503 /usr/lib/systemd/system-generators/torcx-generator[1809]: time="2024-02-09T09:55:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:55:19.160522 /usr/lib/systemd/system-generators/torcx-generator[1809]: time="2024-02-09T09:55:19Z" level=info msg="torcx already run" Feb 9 09:55:19.216165 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:55:19.216174 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:55:19.229824 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:55:19.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit: BPF prog-id=37 op=LOAD Feb 9 09:55:19.276000 audit: BPF prog-id=21 op=UNLOAD Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit: BPF prog-id=38 op=LOAD Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit: BPF prog-id=39 op=LOAD Feb 9 09:55:19.276000 audit: BPF prog-id=22 op=UNLOAD Feb 9 09:55:19.276000 audit: BPF prog-id=23 op=UNLOAD Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit: BPF prog-id=40 op=LOAD Feb 9 09:55:19.276000 audit: BPF prog-id=27 op=UNLOAD Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit: BPF prog-id=41 op=LOAD Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.277000 audit: BPF prog-id=42 op=LOAD Feb 9 09:55:19.277000 audit: BPF prog-id=28 op=UNLOAD Feb 9 09:55:19.277000 audit: BPF prog-id=29 op=UNLOAD Feb 9 09:55:19.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.277000 audit: BPF prog-id=43 op=LOAD Feb 9 09:55:19.277000 audit: BPF prog-id=26 op=UNLOAD Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit: BPF prog-id=44 op=LOAD Feb 9 09:55:19.278000 audit: BPF prog-id=32 op=UNLOAD Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit: BPF prog-id=45 op=LOAD Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.278000 audit: BPF prog-id=46 op=LOAD Feb 9 09:55:19.278000 audit: BPF prog-id=33 op=UNLOAD Feb 9 09:55:19.278000 audit: BPF prog-id=34 op=UNLOAD Feb 9 09:55:19.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit: BPF prog-id=47 op=LOAD Feb 9 09:55:19.280000 audit: BPF prog-id=30 op=UNLOAD Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit: BPF prog-id=48 op=LOAD Feb 9 09:55:19.280000 audit: BPF prog-id=35 op=UNLOAD Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.280000 audit: BPF prog-id=49 op=LOAD Feb 9 09:55:19.280000 audit: BPF prog-id=31 op=UNLOAD Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit: BPF prog-id=50 op=LOAD Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:19.281000 audit: BPF prog-id=51 op=LOAD Feb 9 09:55:19.281000 audit: BPF prog-id=24 op=UNLOAD Feb 9 09:55:19.281000 audit: BPF prog-id=25 op=UNLOAD Feb 9 09:55:19.285436 systemd[1]: Started kubelet.service. Feb 9 09:55:19.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:19.307702 kubelet[1867]: E0209 09:55:19.307641 1867 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 09:55:19.308949 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:55:19.309017 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:55:19.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:55:19.930496 env[1477]: time="2024-02-09T09:55:19.930467751Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 09:55:20.613131 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount731183330.mount: Deactivated successfully. Feb 9 09:55:23.197499 env[1477]: time="2024-02-09T09:55:23.197451453Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:23.198447 env[1477]: time="2024-02-09T09:55:23.198423775Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:23.199953 env[1477]: time="2024-02-09T09:55:23.199937876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:23.200874 env[1477]: time="2024-02-09T09:55:23.200862321Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:23.201275 env[1477]: time="2024-02-09T09:55:23.201260463Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 9 09:55:23.207155 env[1477]: time="2024-02-09T09:55:23.207084458Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 09:55:26.152679 env[1477]: time="2024-02-09T09:55:26.152652038Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:26.153257 env[1477]: time="2024-02-09T09:55:26.153244459Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:26.154390 env[1477]: time="2024-02-09T09:55:26.154345500Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:26.155546 env[1477]: time="2024-02-09T09:55:26.155504828Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:26.155918 env[1477]: time="2024-02-09T09:55:26.155877521Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 9 09:55:26.161772 env[1477]: time="2024-02-09T09:55:26.161758220Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 09:55:27.852091 env[1477]: time="2024-02-09T09:55:27.852029040Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:27.852675 env[1477]: time="2024-02-09T09:55:27.852645248Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:27.853835 env[1477]: time="2024-02-09T09:55:27.853823024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:27.855420 env[1477]: time="2024-02-09T09:55:27.855404722Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:27.856276 env[1477]: time="2024-02-09T09:55:27.856235718Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 9 09:55:27.864855 env[1477]: time="2024-02-09T09:55:27.864808371Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 09:55:28.810130 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1876755418.mount: Deactivated successfully. Feb 9 09:55:29.260065 env[1477]: time="2024-02-09T09:55:29.259986352Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:29.260659 env[1477]: time="2024-02-09T09:55:29.260546778Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:29.261305 env[1477]: time="2024-02-09T09:55:29.261252246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:29.262083 env[1477]: time="2024-02-09T09:55:29.262049374Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:29.262290 env[1477]: time="2024-02-09T09:55:29.262252401Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 09:55:29.267746 env[1477]: time="2024-02-09T09:55:29.267710845Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 09:55:29.554636 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 09:55:29.555174 systemd[1]: Stopped kubelet.service. Feb 9 09:55:29.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:29.557205 systemd[1]: Started kubelet.service. Feb 9 09:55:29.560891 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 9 09:55:29.560965 kernel: audit: type=1130 audit(1707472529.553:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:29.580018 kubelet[1944]: E0209 09:55:29.579958 1944 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 09:55:29.582431 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:55:29.582502 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:55:29.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:29.638543 kernel: audit: type=1131 audit(1707472529.553:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:29.638579 kernel: audit: type=1130 audit(1707472529.555:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:29.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:29.693839 kernel: audit: type=1131 audit(1707472529.581:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:55:29.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:55:29.786651 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3941000040.mount: Deactivated successfully. Feb 9 09:55:29.787374 env[1477]: time="2024-02-09T09:55:29.787325704Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:29.787914 env[1477]: time="2024-02-09T09:55:29.787873629Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:29.788575 env[1477]: time="2024-02-09T09:55:29.788533754Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:29.789241 env[1477]: time="2024-02-09T09:55:29.789201721Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:29.789889 env[1477]: time="2024-02-09T09:55:29.789846480Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 09:55:29.796428 env[1477]: time="2024-02-09T09:55:29.796405314Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 09:55:30.535288 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount913655996.mount: Deactivated successfully. Feb 9 09:55:33.450955 env[1477]: time="2024-02-09T09:55:33.450896315Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:33.451540 env[1477]: time="2024-02-09T09:55:33.451501561Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:33.452406 env[1477]: time="2024-02-09T09:55:33.452366084Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:33.453224 env[1477]: time="2024-02-09T09:55:33.453185498Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:33.453587 env[1477]: time="2024-02-09T09:55:33.453543055Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 9 09:55:33.459890 env[1477]: time="2024-02-09T09:55:33.459869124Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 09:55:34.037351 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3072551939.mount: Deactivated successfully. Feb 9 09:55:34.475159 env[1477]: time="2024-02-09T09:55:34.475103259Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:34.475765 env[1477]: time="2024-02-09T09:55:34.475730063Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:34.476405 env[1477]: time="2024-02-09T09:55:34.476370733Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:34.477098 env[1477]: time="2024-02-09T09:55:34.477050593Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:34.477440 env[1477]: time="2024-02-09T09:55:34.477405706Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 9 09:55:35.816202 systemd[1]: Stopped kubelet.service. Feb 9 09:55:35.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:35.825549 systemd[1]: Reloading. Feb 9 09:55:35.857420 /usr/lib/systemd/system-generators/torcx-generator[2107]: time="2024-02-09T09:55:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:55:35.857471 /usr/lib/systemd/system-generators/torcx-generator[2107]: time="2024-02-09T09:55:35Z" level=info msg="torcx already run" Feb 9 09:55:35.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:35.875630 kernel: audit: type=1130 audit(1707472535.814:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:35.875676 kernel: audit: type=1131 audit(1707472535.814:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:35.954568 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:55:35.954576 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:55:35.965255 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:55:36.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.133605 kernel: audit: type=1400 audit(1707472536.009:393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.133693 kernel: audit: type=1400 audit(1707472536.009:394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.133741 kernel: audit: type=1400 audit(1707472536.009:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.195881 kernel: audit: type=1400 audit(1707472536.009:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.259103 kernel: audit: type=1400 audit(1707472536.009:397): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.322768 kernel: audit: type=1400 audit(1707472536.009:398): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.386298 kernel: audit: type=1400 audit(1707472536.009:399): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.449913 kernel: audit: type=1400 audit(1707472536.009:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.194000 audit: BPF prog-id=52 op=LOAD Feb 9 09:55:36.194000 audit: BPF prog-id=37 op=UNLOAD Feb 9 09:55:36.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.321000 audit: BPF prog-id=53 op=LOAD Feb 9 09:55:36.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit: BPF prog-id=54 op=LOAD Feb 9 09:55:36.512000 audit: BPF prog-id=38 op=UNLOAD Feb 9 09:55:36.512000 audit: BPF prog-id=39 op=UNLOAD Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit: BPF prog-id=55 op=LOAD Feb 9 09:55:36.512000 audit: BPF prog-id=40 op=UNLOAD Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit: BPF prog-id=56 op=LOAD Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit: BPF prog-id=57 op=LOAD Feb 9 09:55:36.513000 audit: BPF prog-id=41 op=UNLOAD Feb 9 09:55:36.513000 audit: BPF prog-id=42 op=UNLOAD Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.514000 audit: BPF prog-id=58 op=LOAD Feb 9 09:55:36.514000 audit: BPF prog-id=43 op=UNLOAD Feb 9 09:55:36.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit: BPF prog-id=59 op=LOAD Feb 9 09:55:36.515000 audit: BPF prog-id=44 op=UNLOAD Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit: BPF prog-id=60 op=LOAD Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.515000 audit: BPF prog-id=61 op=LOAD Feb 9 09:55:36.515000 audit: BPF prog-id=45 op=UNLOAD Feb 9 09:55:36.515000 audit: BPF prog-id=46 op=UNLOAD Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit: BPF prog-id=62 op=LOAD Feb 9 09:55:36.516000 audit: BPF prog-id=47 op=UNLOAD Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.516000 audit: BPF prog-id=63 op=LOAD Feb 9 09:55:36.517000 audit: BPF prog-id=48 op=UNLOAD Feb 9 09:55:36.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.517000 audit: BPF prog-id=64 op=LOAD Feb 9 09:55:36.517000 audit: BPF prog-id=49 op=UNLOAD Feb 9 09:55:36.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit: BPF prog-id=65 op=LOAD Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.518000 audit: BPF prog-id=66 op=LOAD Feb 9 09:55:36.518000 audit: BPF prog-id=50 op=UNLOAD Feb 9 09:55:36.518000 audit: BPF prog-id=51 op=UNLOAD Feb 9 09:55:36.525683 systemd[1]: Started kubelet.service. Feb 9 09:55:36.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:36.548940 kubelet[2167]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 09:55:36.548940 kubelet[2167]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:55:36.548940 kubelet[2167]: I0209 09:55:36.548922 2167 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 09:55:36.549669 kubelet[2167]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 09:55:36.549669 kubelet[2167]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:55:36.720914 kubelet[2167]: I0209 09:55:36.720883 2167 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 09:55:36.720914 kubelet[2167]: I0209 09:55:36.720892 2167 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 09:55:36.720997 kubelet[2167]: I0209 09:55:36.720991 2167 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 09:55:36.722496 kubelet[2167]: I0209 09:55:36.722487 2167 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:55:36.722886 kubelet[2167]: E0209 09:55:36.722879 2167 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.90.113:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:36.741857 kubelet[2167]: I0209 09:55:36.741848 2167 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 09:55:36.741956 kubelet[2167]: I0209 09:55:36.741950 2167 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 09:55:36.741991 kubelet[2167]: I0209 09:55:36.741986 2167 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 09:55:36.742052 kubelet[2167]: I0209 09:55:36.741997 2167 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 09:55:36.742052 kubelet[2167]: I0209 09:55:36.742004 2167 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 09:55:36.742052 kubelet[2167]: I0209 09:55:36.742049 2167 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:55:36.743287 kubelet[2167]: I0209 09:55:36.743280 2167 kubelet.go:398] "Attempting to sync node with API server" Feb 9 09:55:36.743318 kubelet[2167]: I0209 09:55:36.743290 2167 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 09:55:36.743318 kubelet[2167]: I0209 09:55:36.743302 2167 kubelet.go:297] "Adding apiserver pod source" Feb 9 09:55:36.743318 kubelet[2167]: I0209 09:55:36.743310 2167 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 09:55:36.743654 kubelet[2167]: W0209 09:55:36.743630 2167 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.90.113:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:36.743654 kubelet[2167]: W0209 09:55:36.743630 2167 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.90.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-b0ed76e28d&limit=500&resourceVersion=0": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:36.743745 kubelet[2167]: E0209 09:55:36.743663 2167 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.90.113:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:36.743745 kubelet[2167]: E0209 09:55:36.743665 2167 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.90.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-b0ed76e28d&limit=500&resourceVersion=0": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:36.743745 kubelet[2167]: I0209 09:55:36.743696 2167 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 09:55:36.743858 kubelet[2167]: W0209 09:55:36.743852 2167 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 09:55:36.744045 kubelet[2167]: I0209 09:55:36.744039 2167 server.go:1186] "Started kubelet" Feb 9 09:55:36.744094 kubelet[2167]: I0209 09:55:36.744088 2167 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 09:55:36.744277 kubelet[2167]: E0209 09:55:36.744264 2167 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 09:55:36.744326 kubelet[2167]: E0209 09:55:36.744284 2167 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 09:55:36.744424 kubelet[2167]: E0209 09:55:36.744362 2167 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-b0ed76e28d.17b22939c05cef2d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-b0ed76e28d", UID:"ci-3510.3.2-a-b0ed76e28d", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-b0ed76e28d"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 36, 744029997, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 36, 744029997, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://139.178.90.113:6443/api/v1/namespaces/default/events": dial tcp 139.178.90.113:6443: connect: connection refused'(may retry after sleeping) Feb 9 09:55:36.744689 kubelet[2167]: I0209 09:55:36.744664 2167 server.go:451] "Adding debug handlers to kubelet server" Feb 9 09:55:36.743000 audit[2167]: AVC avc: denied { mac_admin } for pid=2167 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.743000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:55:36.743000 audit[2167]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dc6900 a1=c000dc85e8 a2=c000dc68d0 a3=25 items=0 ppid=1 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.743000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:55:36.743000 audit[2167]: AVC avc: denied { mac_admin } for pid=2167 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.743000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:55:36.743000 audit[2167]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dd42a0 a1=c000dc8600 a2=c000dc6990 a3=25 items=0 ppid=1 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.743000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:55:36.745063 kubelet[2167]: I0209 09:55:36.744835 2167 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 09:55:36.745063 kubelet[2167]: I0209 09:55:36.744863 2167 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 09:55:36.745063 kubelet[2167]: I0209 09:55:36.744900 2167 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 09:55:36.745063 kubelet[2167]: I0209 09:55:36.744961 2167 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 09:55:36.745063 kubelet[2167]: E0209 09:55:36.744993 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:36.745063 kubelet[2167]: I0209 09:55:36.744996 2167 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 09:55:36.745199 kubelet[2167]: E0209 09:55:36.745115 2167 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://139.178.90.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-b0ed76e28d?timeout=10s": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:36.745199 kubelet[2167]: W0209 09:55:36.745140 2167 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.90.113:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:36.745199 kubelet[2167]: E0209 09:55:36.745171 2167 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.90.113:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:36.745000 audit[2191]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.745000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd55904360 a2=0 a3=7ffd5590434c items=0 ppid=2167 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.745000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:55:36.745000 audit[2194]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.745000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9ddaf940 a2=0 a3=7fff9ddaf92c items=0 ppid=2167 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.745000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:55:36.746000 audit[2196]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.746000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff38c85cf0 a2=0 a3=7fff38c85cdc items=0 ppid=2167 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:55:36.747000 audit[2198]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.747000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe66527c40 a2=0 a3=7ffe66527c2c items=0 ppid=2167 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.747000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:55:36.750000 audit[2201]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.750000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffebfc36f80 a2=0 a3=7ffebfc36f6c items=0 ppid=2167 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 09:55:36.751000 audit[2202]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.751000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe8924d640 a2=0 a3=7ffe8924d62c items=0 ppid=2167 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 09:55:36.754000 audit[2206]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.754000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcf0cdcbb0 a2=0 a3=7ffcf0cdcb9c items=0 ppid=2167 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 09:55:36.757364 kubelet[2167]: I0209 09:55:36.757354 2167 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 09:55:36.757364 kubelet[2167]: I0209 09:55:36.757362 2167 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 09:55:36.757445 kubelet[2167]: I0209 09:55:36.757370 2167 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:55:36.756000 audit[2209]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.756000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff756e5770 a2=0 a3=7fff756e575c items=0 ppid=2167 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 09:55:36.758231 kubelet[2167]: I0209 09:55:36.758198 2167 policy_none.go:49] "None policy: Start" Feb 9 09:55:36.756000 audit[2210]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.756000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf02e72f0 a2=0 a3=7ffdf02e72dc items=0 ppid=2167 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 09:55:36.758440 kubelet[2167]: I0209 09:55:36.758433 2167 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 09:55:36.758466 kubelet[2167]: I0209 09:55:36.758443 2167 state_mem.go:35] "Initializing new in-memory state store" Feb 9 09:55:36.757000 audit[2211]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.757000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd48bf9020 a2=0 a3=7ffd48bf900c items=0 ppid=2167 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.757000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:55:36.758000 audit[2213]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.758000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffd9f22f00 a2=0 a3=7fffd9f22eec items=0 ppid=2167 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 09:55:36.760683 systemd[1]: Created slice kubepods.slice. Feb 9 09:55:36.759000 audit[2215]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.759000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffec9dc3a70 a2=0 a3=7ffec9dc3a5c items=0 ppid=2167 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:55:36.760000 audit[2217]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.760000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fffef6e9380 a2=0 a3=7fffef6e936c items=0 ppid=2167 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 09:55:36.762666 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 09:55:36.761000 audit[2219]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.761000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffe949d1e60 a2=0 a3=7ffe949d1e4c items=0 ppid=2167 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 09:55:36.764069 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 09:55:36.762000 audit[2221]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.762000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffe3e6e9970 a2=0 a3=7ffe3e6e995c items=0 ppid=2167 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 09:55:36.764637 kubelet[2167]: I0209 09:55:36.764595 2167 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 09:55:36.763000 audit[2222]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.763000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffef2ef7a60 a2=0 a3=7ffef2ef7a4c items=0 ppid=2167 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.763000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:55:36.763000 audit[2223]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.763000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2b1c20c0 a2=0 a3=7ffd2b1c20ac items=0 ppid=2167 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:55:36.763000 audit[2224]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.763000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd169deed0 a2=0 a3=7ffd169deebc items=0 ppid=2167 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.763000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 09:55:36.764000 audit[2225]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.764000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe589af90 a2=0 a3=7fffe589af7c items=0 ppid=2167 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:55:36.764000 audit[2227]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:36.764000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8757a710 a2=0 a3=7ffd8757a6fc items=0 ppid=2167 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:55:36.764000 audit[2228]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.764000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcfa1cc860 a2=0 a3=7ffcfa1cc84c items=0 ppid=2167 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 09:55:36.765000 audit[2229]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.765000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc3566f230 a2=0 a3=7ffc3566f21c items=0 ppid=2167 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.765000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:55:36.766000 audit[2231]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.766000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffd53d25850 a2=0 a3=7ffd53d2583c items=0 ppid=2167 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.766000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 09:55:36.766000 audit[2232]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.766000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffecfc624f0 a2=0 a3=7ffecfc624dc items=0 ppid=2167 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.766000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 09:55:36.767000 audit[2233]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.767000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6613c990 a2=0 a3=7fff6613c97c items=0 ppid=2167 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:55:36.768000 audit[2235]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.768000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc7aaa3720 a2=0 a3=7ffc7aaa370c items=0 ppid=2167 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 09:55:36.769000 audit[2237]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.769000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe8b678860 a2=0 a3=7ffe8b67884c items=0 ppid=2167 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:55:36.770000 audit[2239]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.770000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffed31e4b40 a2=0 a3=7ffed31e4b2c items=0 ppid=2167 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 09:55:36.771000 audit[2241]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.771000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd27947f00 a2=0 a3=7ffd27947eec items=0 ppid=2167 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 09:55:36.773000 audit[2243]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.773000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffd46ac8f90 a2=0 a3=7ffd46ac8f7c items=0 ppid=2167 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 09:55:36.775134 kubelet[2167]: I0209 09:55:36.775125 2167 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 09:55:36.775134 kubelet[2167]: I0209 09:55:36.775134 2167 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 09:55:36.775176 kubelet[2167]: I0209 09:55:36.775144 2167 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 09:55:36.775176 kubelet[2167]: E0209 09:55:36.775166 2167 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 09:55:36.775429 kubelet[2167]: W0209 09:55:36.775405 2167 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.90.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:36.775471 kubelet[2167]: E0209 09:55:36.775438 2167 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.90.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:36.774000 audit[2244]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.774000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc91f00db0 a2=0 a3=7ffc91f00d9c items=0 ppid=2167 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:55:36.774000 audit[2245]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.774000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8a5cf4d0 a2=0 a3=7ffc8a5cf4bc items=0 ppid=2167 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:55:36.774000 audit[2246]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:36.774000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe31794770 a2=0 a3=7ffe3179475c items=0 ppid=2167 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:55:36.791163 kubelet[2167]: I0209 09:55:36.791153 2167 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 09:55:36.789000 audit[2167]: AVC avc: denied { mac_admin } for pid=2167 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:36.789000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:55:36.789000 audit[2167]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dc7110 a1=c000a90300 a2=c000dc70e0 a3=25 items=0 ppid=1 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:36.789000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:55:36.791386 kubelet[2167]: I0209 09:55:36.791193 2167 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 09:55:36.791386 kubelet[2167]: I0209 09:55:36.791341 2167 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 09:55:36.791510 kubelet[2167]: E0209 09:55:36.791502 2167 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:36.849216 kubelet[2167]: I0209 09:55:36.849167 2167 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:36.849883 kubelet[2167]: E0209 09:55:36.849813 2167 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.90.113:6443/api/v1/nodes\": dial tcp 139.178.90.113:6443: connect: connection refused" node="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:36.876095 kubelet[2167]: I0209 09:55:36.875966 2167 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:55:36.879794 kubelet[2167]: I0209 09:55:36.879749 2167 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:55:36.883393 kubelet[2167]: I0209 09:55:36.883331 2167 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:55:36.884196 kubelet[2167]: I0209 09:55:36.884130 2167 status_manager.go:698] "Failed to get status for pod" podUID=ef1f83e6621eba87a56ad99e5311eaf0 pod="kube-system/kube-apiserver-ci-3510.3.2-a-b0ed76e28d" err="Get \"https://139.178.90.113:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-a-b0ed76e28d\": dial tcp 139.178.90.113:6443: connect: connection refused" Feb 9 09:55:36.887420 kubelet[2167]: I0209 09:55:36.887365 2167 status_manager.go:698] "Failed to get status for pod" podUID=16e2b4a220d6200b843354f6bdd9a4c3 pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" err="Get \"https://139.178.90.113:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d\": dial tcp 139.178.90.113:6443: connect: connection refused" Feb 9 09:55:36.891434 kubelet[2167]: I0209 09:55:36.891358 2167 status_manager.go:698] "Failed to get status for pod" podUID=d82144187b7ebccf9ac46769530b4b96 pod="kube-system/kube-scheduler-ci-3510.3.2-a-b0ed76e28d" err="Get \"https://139.178.90.113:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-a-b0ed76e28d\": dial tcp 139.178.90.113:6443: connect: connection refused" Feb 9 09:55:36.895987 systemd[1]: Created slice kubepods-burstable-podef1f83e6621eba87a56ad99e5311eaf0.slice. Feb 9 09:55:36.936511 systemd[1]: Created slice kubepods-burstable-pod16e2b4a220d6200b843354f6bdd9a4c3.slice. Feb 9 09:55:36.946471 kubelet[2167]: E0209 09:55:36.946368 2167 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://139.178.90.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-b0ed76e28d?timeout=10s": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:36.956547 systemd[1]: Created slice kubepods-burstable-podd82144187b7ebccf9ac46769530b4b96.slice. Feb 9 09:55:37.046546 kubelet[2167]: I0209 09:55:37.046343 2167 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ef1f83e6621eba87a56ad99e5311eaf0-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-b0ed76e28d\" (UID: \"ef1f83e6621eba87a56ad99e5311eaf0\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:37.046795 kubelet[2167]: I0209 09:55:37.046637 2167 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ef1f83e6621eba87a56ad99e5311eaf0-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-b0ed76e28d\" (UID: \"ef1f83e6621eba87a56ad99e5311eaf0\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:37.046931 kubelet[2167]: I0209 09:55:37.046787 2167 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/16e2b4a220d6200b843354f6bdd9a4c3-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-b0ed76e28d\" (UID: \"16e2b4a220d6200b843354f6bdd9a4c3\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:37.047041 kubelet[2167]: I0209 09:55:37.046969 2167 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/16e2b4a220d6200b843354f6bdd9a4c3-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-b0ed76e28d\" (UID: \"16e2b4a220d6200b843354f6bdd9a4c3\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:37.047312 kubelet[2167]: I0209 09:55:37.047229 2167 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ef1f83e6621eba87a56ad99e5311eaf0-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-b0ed76e28d\" (UID: \"ef1f83e6621eba87a56ad99e5311eaf0\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:37.047488 kubelet[2167]: I0209 09:55:37.047347 2167 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/16e2b4a220d6200b843354f6bdd9a4c3-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-b0ed76e28d\" (UID: \"16e2b4a220d6200b843354f6bdd9a4c3\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:37.047488 kubelet[2167]: I0209 09:55:37.047469 2167 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/16e2b4a220d6200b843354f6bdd9a4c3-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-b0ed76e28d\" (UID: \"16e2b4a220d6200b843354f6bdd9a4c3\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:37.047745 kubelet[2167]: I0209 09:55:37.047582 2167 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d82144187b7ebccf9ac46769530b4b96-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-b0ed76e28d\" (UID: \"d82144187b7ebccf9ac46769530b4b96\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:37.047745 kubelet[2167]: I0209 09:55:37.047701 2167 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/16e2b4a220d6200b843354f6bdd9a4c3-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-b0ed76e28d\" (UID: \"16e2b4a220d6200b843354f6bdd9a4c3\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:37.054323 kubelet[2167]: I0209 09:55:37.054276 2167 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:37.055173 kubelet[2167]: E0209 09:55:37.055102 2167 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.90.113:6443/api/v1/nodes\": dial tcp 139.178.90.113:6443: connect: connection refused" node="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:37.232229 env[1477]: time="2024-02-09T09:55:37.232102553Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-b0ed76e28d,Uid:ef1f83e6621eba87a56ad99e5311eaf0,Namespace:kube-system,Attempt:0,}" Feb 9 09:55:37.253124 env[1477]: time="2024-02-09T09:55:37.252981458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-b0ed76e28d,Uid:16e2b4a220d6200b843354f6bdd9a4c3,Namespace:kube-system,Attempt:0,}" Feb 9 09:55:37.263313 env[1477]: time="2024-02-09T09:55:37.263200414Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-b0ed76e28d,Uid:d82144187b7ebccf9ac46769530b4b96,Namespace:kube-system,Attempt:0,}" Feb 9 09:55:37.347414 kubelet[2167]: E0209 09:55:37.347312 2167 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://139.178.90.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-b0ed76e28d?timeout=10s": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:37.459247 kubelet[2167]: I0209 09:55:37.459165 2167 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:37.459921 kubelet[2167]: E0209 09:55:37.459835 2167 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.90.113:6443/api/v1/nodes\": dial tcp 139.178.90.113:6443: connect: connection refused" node="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:37.742957 kubelet[2167]: W0209 09:55:37.742699 2167 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.90.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-b0ed76e28d&limit=500&resourceVersion=0": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:37.742957 kubelet[2167]: E0209 09:55:37.742826 2167 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.90.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-b0ed76e28d&limit=500&resourceVersion=0": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:37.796170 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2257586066.mount: Deactivated successfully. Feb 9 09:55:37.798002 env[1477]: time="2024-02-09T09:55:37.797945280Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.799429 env[1477]: time="2024-02-09T09:55:37.799381124Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.800190 env[1477]: time="2024-02-09T09:55:37.800178794Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.800505 env[1477]: time="2024-02-09T09:55:37.800495306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.800905 env[1477]: time="2024-02-09T09:55:37.800892611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.801265 env[1477]: time="2024-02-09T09:55:37.801253264Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.802502 env[1477]: time="2024-02-09T09:55:37.802490796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.804410 env[1477]: time="2024-02-09T09:55:37.804394717Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.805687 env[1477]: time="2024-02-09T09:55:37.805674988Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.806636 env[1477]: time="2024-02-09T09:55:37.806621088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.807060 env[1477]: time="2024-02-09T09:55:37.807043870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.807497 env[1477]: time="2024-02-09T09:55:37.807486204Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.811710 env[1477]: time="2024-02-09T09:55:37.811673633Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:55:37.811710 env[1477]: time="2024-02-09T09:55:37.811695666Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:55:37.811710 env[1477]: time="2024-02-09T09:55:37.811703038Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:55:37.811827 env[1477]: time="2024-02-09T09:55:37.811770273Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2673db98b7f5ad65bbc2f06ffeefeae5eeb00482b87e2d8afdca3af99aebf70a pid=2255 runtime=io.containerd.runc.v2 Feb 9 09:55:37.813374 env[1477]: time="2024-02-09T09:55:37.813318754Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:55:37.813374 env[1477]: time="2024-02-09T09:55:37.813341182Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:55:37.813374 env[1477]: time="2024-02-09T09:55:37.813349049Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:55:37.813610 env[1477]: time="2024-02-09T09:55:37.813422552Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d5e4baa6df211640cc0d8399aa826ed2077f73861fbca546b8cf270b9a1fda5c pid=2276 runtime=io.containerd.runc.v2 Feb 9 09:55:37.813866 env[1477]: time="2024-02-09T09:55:37.813842990Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:55:37.813910 env[1477]: time="2024-02-09T09:55:37.813861384Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:55:37.813910 env[1477]: time="2024-02-09T09:55:37.813873225Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:55:37.813977 env[1477]: time="2024-02-09T09:55:37.813957290Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3fff30065bf38a9f7e2d26095232be7081a4da7a8e4760e10169338360a714bc pid=2282 runtime=io.containerd.runc.v2 Feb 9 09:55:37.820658 systemd[1]: Started cri-containerd-3fff30065bf38a9f7e2d26095232be7081a4da7a8e4760e10169338360a714bc.scope. Feb 9 09:55:37.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit: BPF prog-id=67 op=LOAD Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2282 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666633303036356266333861396637653264323630393532333262 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2282 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666633303036356266333861396637653264323630393532333262 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit: BPF prog-id=68 op=LOAD Feb 9 09:55:37.825000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000308a90 items=0 ppid=2282 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666633303036356266333861396637653264323630393532333262 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit: BPF prog-id=69 op=LOAD Feb 9 09:55:37.825000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000308ad8 items=0 ppid=2282 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666633303036356266333861396637653264323630393532333262 Feb 9 09:55:37.825000 audit: BPF prog-id=69 op=UNLOAD Feb 9 09:55:37.825000 audit: BPF prog-id=68 op=UNLOAD Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.825000 audit: BPF prog-id=70 op=LOAD Feb 9 09:55:37.825000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000308ee8 items=0 ppid=2282 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666633303036356266333861396637653264323630393532333262 Feb 9 09:55:37.829627 systemd[1]: Started cri-containerd-2673db98b7f5ad65bbc2f06ffeefeae5eeb00482b87e2d8afdca3af99aebf70a.scope. Feb 9 09:55:37.831891 systemd[1]: Started cri-containerd-d5e4baa6df211640cc0d8399aa826ed2077f73861fbca546b8cf270b9a1fda5c.scope. Feb 9 09:55:37.833621 kubelet[2167]: W0209 09:55:37.833561 2167 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.90.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:37.833621 kubelet[2167]: E0209 09:55:37.833597 2167 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.90.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.90.113:6443: connect: connection refused Feb 9 09:55:37.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.834000 audit: BPF prog-id=71 op=LOAD Feb 9 09:55:37.834000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.834000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2255 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236373364623938623766356164363562626332663036666665656665 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2255 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236373364623938623766356164363562626332663036666665656665 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit: BPF prog-id=72 op=LOAD Feb 9 09:55:37.835000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003dc570 items=0 ppid=2255 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236373364623938623766356164363562626332663036666665656665 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit: BPF prog-id=73 op=LOAD Feb 9 09:55:37.835000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dc5b8 items=0 ppid=2255 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236373364623938623766356164363562626332663036666665656665 Feb 9 09:55:37.835000 audit: BPF prog-id=73 op=UNLOAD Feb 9 09:55:37.835000 audit: BPF prog-id=72 op=UNLOAD Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.835000 audit: BPF prog-id=74 op=LOAD Feb 9 09:55:37.835000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dc9c8 items=0 ppid=2255 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236373364623938623766356164363562626332663036666665656665 Feb 9 09:55:37.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit: BPF prog-id=75 op=LOAD Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2276 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653462616136646632313136343063633064383339396161383236 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2276 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653462616136646632313136343063633064383339396161383236 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit: BPF prog-id=76 op=LOAD Feb 9 09:55:37.836000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024870 items=0 ppid=2276 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653462616136646632313136343063633064383339396161383236 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit: BPF prog-id=77 op=LOAD Feb 9 09:55:37.836000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000248b8 items=0 ppid=2276 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653462616136646632313136343063633064383339396161383236 Feb 9 09:55:37.836000 audit: BPF prog-id=77 op=UNLOAD Feb 9 09:55:37.836000 audit: BPF prog-id=76 op=UNLOAD Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.836000 audit: BPF prog-id=78 op=LOAD Feb 9 09:55:37.836000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024cc8 items=0 ppid=2276 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653462616136646632313136343063633064383339396161383236 Feb 9 09:55:37.857883 env[1477]: time="2024-02-09T09:55:37.857828474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-b0ed76e28d,Uid:d82144187b7ebccf9ac46769530b4b96,Namespace:kube-system,Attempt:0,} returns sandbox id \"3fff30065bf38a9f7e2d26095232be7081a4da7a8e4760e10169338360a714bc\"" Feb 9 09:55:37.859336 env[1477]: time="2024-02-09T09:55:37.859322321Z" level=info msg="CreateContainer within sandbox \"3fff30065bf38a9f7e2d26095232be7081a4da7a8e4760e10169338360a714bc\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 09:55:37.864093 env[1477]: time="2024-02-09T09:55:37.864051026Z" level=info msg="CreateContainer within sandbox \"3fff30065bf38a9f7e2d26095232be7081a4da7a8e4760e10169338360a714bc\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"ce874c061aa47c28dadc6000b0a4131b800981d3bfa0deae2577917060cfc7dc\"" Feb 9 09:55:37.864335 env[1477]: time="2024-02-09T09:55:37.864285000Z" level=info msg="StartContainer for \"ce874c061aa47c28dadc6000b0a4131b800981d3bfa0deae2577917060cfc7dc\"" Feb 9 09:55:37.867952 env[1477]: time="2024-02-09T09:55:37.867921614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-b0ed76e28d,Uid:ef1f83e6621eba87a56ad99e5311eaf0,Namespace:kube-system,Attempt:0,} returns sandbox id \"d5e4baa6df211640cc0d8399aa826ed2077f73861fbca546b8cf270b9a1fda5c\"" Feb 9 09:55:37.868026 env[1477]: time="2024-02-09T09:55:37.867935543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-b0ed76e28d,Uid:16e2b4a220d6200b843354f6bdd9a4c3,Namespace:kube-system,Attempt:0,} returns sandbox id \"2673db98b7f5ad65bbc2f06ffeefeae5eeb00482b87e2d8afdca3af99aebf70a\"" Feb 9 09:55:37.869114 env[1477]: time="2024-02-09T09:55:37.869100789Z" level=info msg="CreateContainer within sandbox \"2673db98b7f5ad65bbc2f06ffeefeae5eeb00482b87e2d8afdca3af99aebf70a\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 09:55:37.869270 env[1477]: time="2024-02-09T09:55:37.869258207Z" level=info msg="CreateContainer within sandbox \"d5e4baa6df211640cc0d8399aa826ed2077f73861fbca546b8cf270b9a1fda5c\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 09:55:37.873782 env[1477]: time="2024-02-09T09:55:37.873767247Z" level=info msg="CreateContainer within sandbox \"2673db98b7f5ad65bbc2f06ffeefeae5eeb00482b87e2d8afdca3af99aebf70a\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"8e1da936777ef40cfd628726b3d398f7933eb8ca5d673c1db6f47d73eae1ef9a\"" Feb 9 09:55:37.873955 env[1477]: time="2024-02-09T09:55:37.873941571Z" level=info msg="StartContainer for \"8e1da936777ef40cfd628726b3d398f7933eb8ca5d673c1db6f47d73eae1ef9a\"" Feb 9 09:55:37.874784 env[1477]: time="2024-02-09T09:55:37.874769965Z" level=info msg="CreateContainer within sandbox \"d5e4baa6df211640cc0d8399aa826ed2077f73861fbca546b8cf270b9a1fda5c\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"522e0254b7b654d07a8cdb04df14ee45b9a0cd9ec2644570e4b1b92744f865a1\"" Feb 9 09:55:37.874942 env[1477]: time="2024-02-09T09:55:37.874932029Z" level=info msg="StartContainer for \"522e0254b7b654d07a8cdb04df14ee45b9a0cd9ec2644570e4b1b92744f865a1\"" Feb 9 09:55:37.882515 systemd[1]: Started cri-containerd-522e0254b7b654d07a8cdb04df14ee45b9a0cd9ec2644570e4b1b92744f865a1.scope. Feb 9 09:55:37.883832 systemd[1]: Started cri-containerd-ce874c061aa47c28dadc6000b0a4131b800981d3bfa0deae2577917060cfc7dc.scope. Feb 9 09:55:37.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.887000 audit: BPF prog-id=79 op=LOAD Feb 9 09:55:37.887000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.887000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2276 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532326530323534623762363534643037613863646230346466313465 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2276 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532326530323534623762363534643037613863646230346466313465 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit: BPF prog-id=80 op=LOAD Feb 9 09:55:37.888000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003d8120 items=0 ppid=2276 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532326530323534623762363534643037613863646230346466313465 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit: BPF prog-id=81 op=LOAD Feb 9 09:55:37.888000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003d8168 items=0 ppid=2276 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532326530323534623762363534643037613863646230346466313465 Feb 9 09:55:37.888000 audit: BPF prog-id=81 op=UNLOAD Feb 9 09:55:37.888000 audit: BPF prog-id=80 op=UNLOAD Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit: BPF prog-id=82 op=LOAD Feb 9 09:55:37.888000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d8578 items=0 ppid=2276 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532326530323534623762363534643037613863646230346466313465 Feb 9 09:55:37.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit: BPF prog-id=83 op=LOAD Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2282 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383734633036316161343763323864616463363030306230613431 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2282 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383734633036316161343763323864616463363030306230613431 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit: BPF prog-id=84 op=LOAD Feb 9 09:55:37.888000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003da120 items=0 ppid=2282 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383734633036316161343763323864616463363030306230613431 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit: BPF prog-id=85 op=LOAD Feb 9 09:55:37.888000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003da168 items=0 ppid=2282 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383734633036316161343763323864616463363030306230613431 Feb 9 09:55:37.888000 audit: BPF prog-id=85 op=UNLOAD Feb 9 09:55:37.888000 audit: BPF prog-id=84 op=UNLOAD Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.888000 audit: BPF prog-id=86 op=LOAD Feb 9 09:55:37.888000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003da578 items=0 ppid=2282 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383734633036316161343763323864616463363030306230613431 Feb 9 09:55:37.893316 systemd[1]: Started cri-containerd-8e1da936777ef40cfd628726b3d398f7933eb8ca5d673c1db6f47d73eae1ef9a.scope. Feb 9 09:55:37.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit: BPF prog-id=87 op=LOAD Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2255 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865316461393336373737656634306366643632383732366233643339 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=2255 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865316461393336373737656634306366643632383732366233643339 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit: BPF prog-id=88 op=LOAD Feb 9 09:55:37.898000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0003ca120 items=0 ppid=2255 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865316461393336373737656634306366643632383732366233643339 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit: BPF prog-id=89 op=LOAD Feb 9 09:55:37.898000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0003ca168 items=0 ppid=2255 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865316461393336373737656634306366643632383732366233643339 Feb 9 09:55:37.898000 audit: BPF prog-id=89 op=UNLOAD Feb 9 09:55:37.898000 audit: BPF prog-id=88 op=UNLOAD Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:37.898000 audit: BPF prog-id=90 op=LOAD Feb 9 09:55:37.898000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0003ca578 items=0 ppid=2255 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:37.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865316461393336373737656634306366643632383732366233643339 Feb 9 09:55:37.917329 env[1477]: time="2024-02-09T09:55:37.917303875Z" level=info msg="StartContainer for \"ce874c061aa47c28dadc6000b0a4131b800981d3bfa0deae2577917060cfc7dc\" returns successfully" Feb 9 09:55:37.918087 env[1477]: time="2024-02-09T09:55:37.918071804Z" level=info msg="StartContainer for \"8e1da936777ef40cfd628726b3d398f7933eb8ca5d673c1db6f47d73eae1ef9a\" returns successfully" Feb 9 09:55:37.919243 env[1477]: time="2024-02-09T09:55:37.919226760Z" level=info msg="StartContainer for \"522e0254b7b654d07a8cdb04df14ee45b9a0cd9ec2644570e4b1b92744f865a1\" returns successfully" Feb 9 09:55:38.261687 kubelet[2167]: I0209 09:55:38.261672 2167 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:38.748000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:38.748000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:38.748000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0001b2510 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:55:38.748000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003b81c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:55:38.748000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:55:38.748000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:55:38.804000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:38.804000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:38.804000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c00b504000 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:55:38.804000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c002d2a080 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:55:38.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:55:38.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:55:38.804000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:38.804000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c003ee2000 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:55:38.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:55:38.805000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:38.805000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c005d9a030 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:55:38.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:55:38.805000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:38.805000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c002e28580 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:55:38.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:55:38.815710 kubelet[2167]: E0209 09:55:38.815692 2167 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-b0ed76e28d\" not found" node="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:38.818000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:38.818000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c003ee2c90 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:55:38.818000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:55:38.921924 kubelet[2167]: I0209 09:55:38.921524 2167 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:38.945388 kubelet[2167]: E0209 09:55:38.945356 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:39.046075 kubelet[2167]: E0209 09:55:39.045843 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:39.146091 kubelet[2167]: E0209 09:55:39.145992 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:39.246626 kubelet[2167]: E0209 09:55:39.246516 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:39.346923 kubelet[2167]: E0209 09:55:39.346833 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:39.447527 kubelet[2167]: E0209 09:55:39.447380 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:39.548758 kubelet[2167]: E0209 09:55:39.548647 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:39.649219 kubelet[2167]: E0209 09:55:39.649006 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:39.749512 kubelet[2167]: E0209 09:55:39.749412 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:39.849807 kubelet[2167]: E0209 09:55:39.849738 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:39.950673 kubelet[2167]: E0209 09:55:39.950464 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:40.051467 kubelet[2167]: E0209 09:55:40.051389 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:40.152350 kubelet[2167]: E0209 09:55:40.152271 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:40.253603 kubelet[2167]: E0209 09:55:40.253414 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:40.354383 kubelet[2167]: E0209 09:55:40.354294 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:40.455245 kubelet[2167]: E0209 09:55:40.455183 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:40.555384 kubelet[2167]: E0209 09:55:40.555293 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:40.656612 kubelet[2167]: E0209 09:55:40.656498 2167 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-b0ed76e28d\" not found" Feb 9 09:55:41.631066 systemd[1]: Reloading. Feb 9 09:55:41.666544 /usr/lib/systemd/system-generators/torcx-generator[2539]: time="2024-02-09T09:55:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:55:41.666570 /usr/lib/systemd/system-generators/torcx-generator[2539]: time="2024-02-09T09:55:41Z" level=info msg="torcx already run" Feb 9 09:55:41.719038 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:55:41.719046 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:55:41.730562 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:55:41.746544 kubelet[2167]: I0209 09:55:41.746499 2167 apiserver.go:52] "Watching apiserver" Feb 9 09:55:41.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.810511 kernel: kauditd_printk_skb: 642 callbacks suppressed Feb 9 09:55:41.810540 kernel: audit: type=1400 audit(1707472541.783:718): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.845792 kubelet[2167]: I0209 09:55:41.845747 2167 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 09:55:41.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.880874 kubelet[2167]: I0209 09:55:41.880837 2167 reconciler.go:41] "Reconciler: start to sync state" Feb 9 09:55:41.939095 kernel: audit: type=1400 audit(1707472541.783:719): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.939124 kernel: audit: type=1400 audit(1707472541.783:720): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.002224 kernel: audit: type=1400 audit(1707472541.783:721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.129291 kernel: audit: type=1400 audit(1707472541.783:722): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.129316 kernel: audit: type=1400 audit(1707472541.783:723): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.194088 kernel: audit: type=1400 audit(1707472541.783:724): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.258213 kernel: audit: type=1400 audit(1707472541.783:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.321610 kernel: audit: type=1400 audit(1707472541.783:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.385600 kernel: audit: type=1400 audit(1707472541.874:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.874000 audit: BPF prog-id=91 op=LOAD Feb 9 09:55:41.874000 audit: BPF prog-id=75 op=UNLOAD Feb 9 09:55:41.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:41.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.065000 audit: BPF prog-id=92 op=LOAD Feb 9 09:55:42.065000 audit: BPF prog-id=52 op=UNLOAD Feb 9 09:55:42.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.193000 audit: BPF prog-id=93 op=LOAD Feb 9 09:55:42.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.321000 audit: BPF prog-id=94 op=LOAD Feb 9 09:55:42.321000 audit: BPF prog-id=53 op=UNLOAD Feb 9 09:55:42.321000 audit: BPF prog-id=54 op=UNLOAD Feb 9 09:55:42.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit: BPF prog-id=95 op=LOAD Feb 9 09:55:42.450000 audit: BPF prog-id=55 op=UNLOAD Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit: BPF prog-id=96 op=LOAD Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.450000 audit: BPF prog-id=97 op=LOAD Feb 9 09:55:42.450000 audit: BPF prog-id=56 op=UNLOAD Feb 9 09:55:42.450000 audit: BPF prog-id=57 op=UNLOAD Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit: BPF prog-id=98 op=LOAD Feb 9 09:55:42.451000 audit: BPF prog-id=83 op=UNLOAD Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit: BPF prog-id=99 op=LOAD Feb 9 09:55:42.452000 audit: BPF prog-id=58 op=UNLOAD Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit: BPF prog-id=100 op=LOAD Feb 9 09:55:42.452000 audit: BPF prog-id=59 op=UNLOAD Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit: BPF prog-id=101 op=LOAD Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit: BPF prog-id=102 op=LOAD Feb 9 09:55:42.453000 audit: BPF prog-id=60 op=UNLOAD Feb 9 09:55:42.453000 audit: BPF prog-id=61 op=UNLOAD Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit: BPF prog-id=103 op=LOAD Feb 9 09:55:42.453000 audit: BPF prog-id=79 op=UNLOAD Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.454000 audit: BPF prog-id=104 op=LOAD Feb 9 09:55:42.454000 audit: BPF prog-id=67 op=UNLOAD Feb 9 09:55:42.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.454000 audit: BPF prog-id=105 op=LOAD Feb 9 09:55:42.454000 audit: BPF prog-id=87 op=UNLOAD Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit: BPF prog-id=106 op=LOAD Feb 9 09:55:42.455000 audit: BPF prog-id=62 op=UNLOAD Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.455000 audit: BPF prog-id=107 op=LOAD Feb 9 09:55:42.455000 audit: BPF prog-id=63 op=UNLOAD Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit: BPF prog-id=108 op=LOAD Feb 9 09:55:42.456000 audit: BPF prog-id=71 op=UNLOAD Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.456000 audit: BPF prog-id=109 op=LOAD Feb 9 09:55:42.456000 audit: BPF prog-id=64 op=UNLOAD Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit: BPF prog-id=110 op=LOAD Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.457000 audit: BPF prog-id=111 op=LOAD Feb 9 09:55:42.457000 audit: BPF prog-id=65 op=UNLOAD Feb 9 09:55:42.457000 audit: BPF prog-id=66 op=UNLOAD Feb 9 09:55:42.464450 systemd[1]: Stopping kubelet.service... Feb 9 09:55:42.486928 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 09:55:42.487032 systemd[1]: Stopped kubelet.service. Feb 9 09:55:42.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:42.487943 systemd[1]: Started kubelet.service. Feb 9 09:55:42.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:42.513121 kubelet[2599]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 09:55:42.513121 kubelet[2599]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:55:42.513391 kubelet[2599]: I0209 09:55:42.513147 2599 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 09:55:42.513943 kubelet[2599]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 09:55:42.513943 kubelet[2599]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:55:42.515630 kubelet[2599]: I0209 09:55:42.515593 2599 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 09:55:42.515630 kubelet[2599]: I0209 09:55:42.515603 2599 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 09:55:42.515742 kubelet[2599]: I0209 09:55:42.515707 2599 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 09:55:42.516402 kubelet[2599]: I0209 09:55:42.516367 2599 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 09:55:42.516764 kubelet[2599]: I0209 09:55:42.516723 2599 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:55:42.534103 kubelet[2599]: I0209 09:55:42.534084 2599 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 09:55:42.534239 kubelet[2599]: I0209 09:55:42.534231 2599 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 09:55:42.534300 kubelet[2599]: I0209 09:55:42.534294 2599 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 09:55:42.534364 kubelet[2599]: I0209 09:55:42.534311 2599 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 09:55:42.534364 kubelet[2599]: I0209 09:55:42.534326 2599 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 09:55:42.534364 kubelet[2599]: I0209 09:55:42.534355 2599 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:55:42.536100 kubelet[2599]: I0209 09:55:42.536093 2599 kubelet.go:398] "Attempting to sync node with API server" Feb 9 09:55:42.536131 kubelet[2599]: I0209 09:55:42.536104 2599 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 09:55:42.536201 kubelet[2599]: I0209 09:55:42.536197 2599 kubelet.go:297] "Adding apiserver pod source" Feb 9 09:55:42.536222 kubelet[2599]: I0209 09:55:42.536206 2599 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 09:55:42.537117 kubelet[2599]: I0209 09:55:42.536847 2599 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 09:55:42.537550 kubelet[2599]: I0209 09:55:42.537523 2599 server.go:1186] "Started kubelet" Feb 9 09:55:42.537602 kubelet[2599]: I0209 09:55:42.537564 2599 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 09:55:42.537787 kubelet[2599]: E0209 09:55:42.537771 2599 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 09:55:42.537831 kubelet[2599]: E0209 09:55:42.537794 2599 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 09:55:42.538205 kubelet[2599]: I0209 09:55:42.538198 2599 server.go:451] "Adding debug handlers to kubelet server" Feb 9 09:55:42.537000 audit[2599]: AVC avc: denied { mac_admin } for pid=2599 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.537000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:55:42.537000 audit[2599]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e12c60 a1=c0002e1e18 a2=c000e12c30 a3=25 items=0 ppid=1 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:42.537000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:55:42.537000 audit[2599]: AVC avc: denied { mac_admin } for pid=2599 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.537000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:55:42.537000 audit[2599]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cb42e0 a1=c0002e1e30 a2=c000e12cf0 a3=25 items=0 ppid=1 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:42.537000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:55:42.538511 kubelet[2599]: I0209 09:55:42.538250 2599 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 09:55:42.538511 kubelet[2599]: I0209 09:55:42.538272 2599 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 09:55:42.538511 kubelet[2599]: I0209 09:55:42.538291 2599 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 09:55:42.538511 kubelet[2599]: I0209 09:55:42.538358 2599 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 09:55:42.538511 kubelet[2599]: I0209 09:55:42.538382 2599 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 09:55:42.550088 kubelet[2599]: I0209 09:55:42.550075 2599 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 09:55:42.556032 kubelet[2599]: I0209 09:55:42.555986 2599 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 09:55:42.556032 kubelet[2599]: I0209 09:55:42.556001 2599 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 09:55:42.556032 kubelet[2599]: I0209 09:55:42.556013 2599 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 09:55:42.556032 kubelet[2599]: E0209 09:55:42.556040 2599 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 09:55:42.557594 kubelet[2599]: I0209 09:55:42.557585 2599 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 09:55:42.557594 kubelet[2599]: I0209 09:55:42.557593 2599 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 09:55:42.557655 kubelet[2599]: I0209 09:55:42.557601 2599 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:55:42.557684 kubelet[2599]: I0209 09:55:42.557676 2599 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 09:55:42.557723 kubelet[2599]: I0209 09:55:42.557687 2599 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 09:55:42.557723 kubelet[2599]: I0209 09:55:42.557691 2599 policy_none.go:49] "None policy: Start" Feb 9 09:55:42.557923 kubelet[2599]: I0209 09:55:42.557916 2599 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 09:55:42.557947 kubelet[2599]: I0209 09:55:42.557928 2599 state_mem.go:35] "Initializing new in-memory state store" Feb 9 09:55:42.558008 kubelet[2599]: I0209 09:55:42.558001 2599 state_mem.go:75] "Updated machine memory state" Feb 9 09:55:42.559000 audit[2599]: AVC avc: denied { mac_admin } for pid=2599 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:42.559000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:55:42.559000 audit[2599]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00083d290 a1=c0013d65d0 a2=c00083d260 a3=25 items=0 ppid=1 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:42.559000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:55:42.559915 kubelet[2599]: I0209 09:55:42.559733 2599 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 09:55:42.559915 kubelet[2599]: I0209 09:55:42.559761 2599 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 09:55:42.559915 kubelet[2599]: I0209 09:55:42.559858 2599 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 09:55:42.645226 kubelet[2599]: I0209 09:55:42.645213 2599 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.650621 kubelet[2599]: I0209 09:55:42.650608 2599 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.650682 kubelet[2599]: I0209 09:55:42.650647 2599 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.656216 kubelet[2599]: I0209 09:55:42.656206 2599 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:55:42.656262 kubelet[2599]: I0209 09:55:42.656253 2599 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:55:42.656298 kubelet[2599]: I0209 09:55:42.656282 2599 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:55:42.659417 kubelet[2599]: E0209 09:55:42.659401 2599 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-b0ed76e28d\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.740238 kubelet[2599]: E0209 09:55:42.740195 2599 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-b0ed76e28d\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.744420 kubelet[2599]: I0209 09:55:42.744403 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/16e2b4a220d6200b843354f6bdd9a4c3-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-b0ed76e28d\" (UID: \"16e2b4a220d6200b843354f6bdd9a4c3\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.744459 kubelet[2599]: I0209 09:55:42.744432 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/16e2b4a220d6200b843354f6bdd9a4c3-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-b0ed76e28d\" (UID: \"16e2b4a220d6200b843354f6bdd9a4c3\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.744459 kubelet[2599]: I0209 09:55:42.744445 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d82144187b7ebccf9ac46769530b4b96-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-b0ed76e28d\" (UID: \"d82144187b7ebccf9ac46769530b4b96\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.744459 kubelet[2599]: I0209 09:55:42.744456 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ef1f83e6621eba87a56ad99e5311eaf0-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-b0ed76e28d\" (UID: \"ef1f83e6621eba87a56ad99e5311eaf0\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.744566 kubelet[2599]: I0209 09:55:42.744468 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ef1f83e6621eba87a56ad99e5311eaf0-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-b0ed76e28d\" (UID: \"ef1f83e6621eba87a56ad99e5311eaf0\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.744566 kubelet[2599]: I0209 09:55:42.744479 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/16e2b4a220d6200b843354f6bdd9a4c3-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-b0ed76e28d\" (UID: \"16e2b4a220d6200b843354f6bdd9a4c3\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.744566 kubelet[2599]: I0209 09:55:42.744492 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/16e2b4a220d6200b843354f6bdd9a4c3-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-b0ed76e28d\" (UID: \"16e2b4a220d6200b843354f6bdd9a4c3\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.744566 kubelet[2599]: I0209 09:55:42.744504 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/16e2b4a220d6200b843354f6bdd9a4c3-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-b0ed76e28d\" (UID: \"16e2b4a220d6200b843354f6bdd9a4c3\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.744566 kubelet[2599]: I0209 09:55:42.744534 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ef1f83e6621eba87a56ad99e5311eaf0-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-b0ed76e28d\" (UID: \"ef1f83e6621eba87a56ad99e5311eaf0\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:42.791000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:42.791000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000650fe0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:55:42.791000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:55:42.791000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:42.791000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011268e0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:55:42.791000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:55:42.792000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:42.792000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0002934e0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:55:42.792000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:55:42.792000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:42.792000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d8af40 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:55:42.792000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:55:42.941220 kubelet[2599]: E0209 09:55:42.941172 2599 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-b0ed76e28d\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:43.537091 kubelet[2599]: I0209 09:55:43.536976 2599 apiserver.go:52] "Watching apiserver" Feb 9 09:55:43.638851 kubelet[2599]: I0209 09:55:43.638753 2599 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 09:55:43.648022 kubelet[2599]: I0209 09:55:43.647913 2599 reconciler.go:41] "Reconciler: start to sync state" Feb 9 09:55:43.945158 kubelet[2599]: E0209 09:55:43.945063 2599 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-b0ed76e28d\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:44.142208 kubelet[2599]: E0209 09:55:44.142140 2599 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-b0ed76e28d\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:44.345378 kubelet[2599]: E0209 09:55:44.345282 2599 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-b0ed76e28d\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" Feb 9 09:55:44.551486 kubelet[2599]: I0209 09:55:44.551464 2599 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-b0ed76e28d" podStartSLOduration=4.551425935 pod.CreationTimestamp="2024-02-09 09:55:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:55:44.551245925 +0000 UTC m=+2.061583095" watchObservedRunningTime="2024-02-09 09:55:44.551425935 +0000 UTC m=+2.061763098" Feb 9 09:55:44.941130 kubelet[2599]: I0209 09:55:44.941077 2599 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-b0ed76e28d" podStartSLOduration=4.941044594 pod.CreationTimestamp="2024-02-09 09:55:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:55:44.940814172 +0000 UTC m=+2.451151345" watchObservedRunningTime="2024-02-09 09:55:44.941044594 +0000 UTC m=+2.451381759" Feb 9 09:55:45.058000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sdb9" ino=525104 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 09:55:45.058000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008bd480 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:55:45.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:55:45.340796 kubelet[2599]: I0209 09:55:45.340779 2599 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-b0ed76e28d" podStartSLOduration=5.34075559 pod.CreationTimestamp="2024-02-09 09:55:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:55:45.340560476 +0000 UTC m=+2.850897638" watchObservedRunningTime="2024-02-09 09:55:45.34075559 +0000 UTC m=+2.851092749" Feb 9 09:55:47.759647 sudo[1632]: pam_unix(sudo:session): session closed for user root Feb 9 09:55:47.758000 audit[1632]: USER_END pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:47.760615 sshd[1629]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:47.762485 systemd[1]: sshd@6-139.178.90.113:22-147.75.109.163:40382.service: Deactivated successfully. Feb 9 09:55:47.763062 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 09:55:47.763181 systemd[1]: session-9.scope: Consumed 2.574s CPU time. Feb 9 09:55:47.763523 systemd-logind[1465]: Session 9 logged out. Waiting for processes to exit. Feb 9 09:55:47.764298 systemd-logind[1465]: Removed session 9. Feb 9 09:55:47.786808 kernel: kauditd_printk_skb: 263 callbacks suppressed Feb 9 09:55:47.786849 kernel: audit: type=1106 audit(1707472547.758:972): pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:47.758000 audit[1632]: CRED_DISP pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:47.964697 kernel: audit: type=1104 audit(1707472547.758:973): pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:47.964722 kernel: audit: type=1106 audit(1707472547.759:974): pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 09:55:47.759000 audit[1629]: USER_END pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 09:55:48.060915 kernel: audit: type=1104 audit(1707472547.759:975): pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 09:55:47.759000 audit[1629]: CRED_DISP pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 09:55:48.150899 kernel: audit: type=1131 audit(1707472547.761:976): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.113:22-147.75.109.163:40382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:47.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.113:22-147.75.109.163:40382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:51.819786 update_engine[1467]: I0209 09:55:51.819670 1467 update_attempter.cc:509] Updating boot flags... Feb 9 09:55:56.577503 kubelet[2599]: I0209 09:55:56.577432 2599 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 09:55:56.578677 env[1477]: time="2024-02-09T09:55:56.578249109Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 09:55:56.579329 kubelet[2599]: I0209 09:55:56.578797 2599 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 09:55:56.643745 kubelet[2599]: I0209 09:55:56.643687 2599 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:55:56.657200 systemd[1]: Created slice kubepods-besteffort-pode2e74308_ebf9_4bbf_b8aa_c65f91dbedef.slice. Feb 9 09:55:56.691609 kubelet[2599]: I0209 09:55:56.691582 2599 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:55:56.697021 systemd[1]: Created slice kubepods-besteffort-podb46b1f8e_78f2_4d24_ab88_2b4a4f902788.slice. Feb 9 09:55:56.733898 kubelet[2599]: I0209 09:55:56.733853 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b46b1f8e-78f2-4d24-ab88-2b4a4f902788-var-lib-calico\") pod \"tigera-operator-cfc98749c-j6h9r\" (UID: \"b46b1f8e-78f2-4d24-ab88-2b4a4f902788\") " pod="tigera-operator/tigera-operator-cfc98749c-j6h9r" Feb 9 09:55:56.734123 kubelet[2599]: I0209 09:55:56.733981 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sd2px\" (UniqueName: \"kubernetes.io/projected/e2e74308-ebf9-4bbf-b8aa-c65f91dbedef-kube-api-access-sd2px\") pod \"kube-proxy-9bdtn\" (UID: \"e2e74308-ebf9-4bbf-b8aa-c65f91dbedef\") " pod="kube-system/kube-proxy-9bdtn" Feb 9 09:55:56.734123 kubelet[2599]: I0209 09:55:56.734056 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rvcst\" (UniqueName: \"kubernetes.io/projected/b46b1f8e-78f2-4d24-ab88-2b4a4f902788-kube-api-access-rvcst\") pod \"tigera-operator-cfc98749c-j6h9r\" (UID: \"b46b1f8e-78f2-4d24-ab88-2b4a4f902788\") " pod="tigera-operator/tigera-operator-cfc98749c-j6h9r" Feb 9 09:55:56.734282 kubelet[2599]: I0209 09:55:56.734158 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e2e74308-ebf9-4bbf-b8aa-c65f91dbedef-kube-proxy\") pod \"kube-proxy-9bdtn\" (UID: \"e2e74308-ebf9-4bbf-b8aa-c65f91dbedef\") " pod="kube-system/kube-proxy-9bdtn" Feb 9 09:55:56.734282 kubelet[2599]: I0209 09:55:56.734217 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e2e74308-ebf9-4bbf-b8aa-c65f91dbedef-xtables-lock\") pod \"kube-proxy-9bdtn\" (UID: \"e2e74308-ebf9-4bbf-b8aa-c65f91dbedef\") " pod="kube-system/kube-proxy-9bdtn" Feb 9 09:55:56.734282 kubelet[2599]: I0209 09:55:56.734275 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e2e74308-ebf9-4bbf-b8aa-c65f91dbedef-lib-modules\") pod \"kube-proxy-9bdtn\" (UID: \"e2e74308-ebf9-4bbf-b8aa-c65f91dbedef\") " pod="kube-system/kube-proxy-9bdtn" Feb 9 09:55:56.974919 env[1477]: time="2024-02-09T09:55:56.974684860Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9bdtn,Uid:e2e74308-ebf9-4bbf-b8aa-c65f91dbedef,Namespace:kube-system,Attempt:0,}" Feb 9 09:55:56.999746 env[1477]: time="2024-02-09T09:55:56.999610137Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:55:56.999746 env[1477]: time="2024-02-09T09:55:56.999706161Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:55:56.999746 env[1477]: time="2024-02-09T09:55:56.999698011Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-j6h9r,Uid:b46b1f8e-78f2-4d24-ab88-2b4a4f902788,Namespace:tigera-operator,Attempt:0,}" Feb 9 09:55:57.000423 env[1477]: time="2024-02-09T09:55:56.999742838Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:55:57.000423 env[1477]: time="2024-02-09T09:55:57.000117965Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bb061750f850001c0df108b63b9398c40a43b54469fda50a05122b302bfca576 pid=2804 runtime=io.containerd.runc.v2 Feb 9 09:55:57.023541 env[1477]: time="2024-02-09T09:55:57.023400188Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:55:57.023541 env[1477]: time="2024-02-09T09:55:57.023504210Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:55:57.023938 env[1477]: time="2024-02-09T09:55:57.023544018Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:55:57.024096 env[1477]: time="2024-02-09T09:55:57.023981781Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6677e375b29eb6464eea6c04babffd8a3941da296d9891bd2b251bc8da0031f6 pid=2827 runtime=io.containerd.runc.v2 Feb 9 09:55:57.039924 systemd[1]: Started cri-containerd-bb061750f850001c0df108b63b9398c40a43b54469fda50a05122b302bfca576.scope. Feb 9 09:55:57.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179337 kernel: audit: type=1400 audit(1707472557.051:977): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179393 kernel: audit: type=1400 audit(1707472557.051:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179408 kernel: audit: type=1400 audit(1707472557.051:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.180681 systemd[1]: Started cri-containerd-6677e375b29eb6464eea6c04babffd8a3941da296d9891bd2b251bc8da0031f6.scope. Feb 9 09:55:57.243078 kernel: audit: type=1400 audit(1707472557.051:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.371170 kernel: audit: type=1400 audit(1707472557.051:981): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.371205 kernel: audit: type=1400 audit(1707472557.051:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.435493 kernel: audit: type=1400 audit(1707472557.051:983): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.499945 kernel: audit: type=1400 audit(1707472557.051:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.564375 kernel: audit: type=1400 audit(1707472557.051:985): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.628434 kernel: audit: type=1400 audit(1707472557.178:986): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.178000 audit: BPF prog-id=112 op=LOAD Feb 9 09:55:57.179000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2804 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303631373530663835303030316330646631303862363362393339 Feb 9 09:55:57.179000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2804 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303631373530663835303030316330646631303862363362393339 Feb 9 09:55:57.179000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.179000 audit: BPF prog-id=113 op=LOAD Feb 9 09:55:57.179000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002133b0 items=0 ppid=2804 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303631373530663835303030316330646631303862363362393339 Feb 9 09:55:57.306000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.306000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.306000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.306000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.306000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.306000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.306000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.306000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.370000 audit: BPF prog-id=114 op=LOAD Feb 9 09:55:57.370000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.370000 audit[2837]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2827 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636373765333735623239656236343634656561366330346261626666 Feb 9 09:55:57.370000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.370000 audit[2837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2827 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636373765333735623239656236343634656561366330346261626666 Feb 9 09:55:57.370000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.370000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.370000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.370000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.370000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.370000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.370000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.370000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.370000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.306000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.306000 audit: BPF prog-id=115 op=LOAD Feb 9 09:55:57.370000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.370000 audit: BPF prog-id=116 op=LOAD Feb 9 09:55:57.306000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002133f8 items=0 ppid=2804 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.370000 audit[2837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029a510 items=0 ppid=2827 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636373765333735623239656236343634656561366330346261626666 Feb 9 09:55:57.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303631373530663835303030316330646631303862363362393339 Feb 9 09:55:57.691000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.691000 audit: BPF prog-id=115 op=UNLOAD Feb 9 09:55:57.691000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.691000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.691000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.691000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.691000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.691000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.691000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit: BPF prog-id=113 op=UNLOAD Feb 9 09:55:57.692000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.691000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.691000 audit: BPF prog-id=117 op=LOAD Feb 9 09:55:57.691000 audit[2837]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029a558 items=0 ppid=2827 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636373765333735623239656236343634656561366330346261626666 Feb 9 09:55:57.692000 audit: BPF prog-id=117 op=UNLOAD Feb 9 09:55:57.692000 audit: BPF prog-id=116 op=UNLOAD Feb 9 09:55:57.692000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit: BPF prog-id=118 op=LOAD Feb 9 09:55:57.692000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000213808 items=0 ppid=2804 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303631373530663835303030316330646631303862363362393339 Feb 9 09:55:57.692000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.692000 audit: BPF prog-id=119 op=LOAD Feb 9 09:55:57.692000 audit[2837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029a968 items=0 ppid=2827 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636373765333735623239656236343634656561366330346261626666 Feb 9 09:55:57.710281 env[1477]: time="2024-02-09T09:55:57.710257913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9bdtn,Uid:e2e74308-ebf9-4bbf-b8aa-c65f91dbedef,Namespace:kube-system,Attempt:0,} returns sandbox id \"bb061750f850001c0df108b63b9398c40a43b54469fda50a05122b302bfca576\"" Feb 9 09:55:57.711414 env[1477]: time="2024-02-09T09:55:57.711368066Z" level=info msg="CreateContainer within sandbox \"bb061750f850001c0df108b63b9398c40a43b54469fda50a05122b302bfca576\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 09:55:57.716510 env[1477]: time="2024-02-09T09:55:57.716494028Z" level=info msg="CreateContainer within sandbox \"bb061750f850001c0df108b63b9398c40a43b54469fda50a05122b302bfca576\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"ec9f9751b2b89f00ed1973c5aa5f5777a6ae890e1cd171d8ce983acb94e9bf0c\"" Feb 9 09:55:57.716747 env[1477]: time="2024-02-09T09:55:57.716706923Z" level=info msg="StartContainer for \"ec9f9751b2b89f00ed1973c5aa5f5777a6ae890e1cd171d8ce983acb94e9bf0c\"" Feb 9 09:55:57.721079 env[1477]: time="2024-02-09T09:55:57.721054402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-j6h9r,Uid:b46b1f8e-78f2-4d24-ab88-2b4a4f902788,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6677e375b29eb6464eea6c04babffd8a3941da296d9891bd2b251bc8da0031f6\"" Feb 9 09:55:57.721826 env[1477]: time="2024-02-09T09:55:57.721813463Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 09:55:57.725051 systemd[1]: Started cri-containerd-ec9f9751b2b89f00ed1973c5aa5f5777a6ae890e1cd171d8ce983acb94e9bf0c.scope. Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2804 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563396639373531623262383966303065643139373363356161356635 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit: BPF prog-id=120 op=LOAD Feb 9 09:55:57.732000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000363c70 items=0 ppid=2804 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563396639373531623262383966303065643139373363356161356635 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.732000 audit: BPF prog-id=121 op=LOAD Feb 9 09:55:57.732000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000363cb8 items=0 ppid=2804 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563396639373531623262383966303065643139373363356161356635 Feb 9 09:55:57.733000 audit: BPF prog-id=121 op=UNLOAD Feb 9 09:55:57.733000 audit: BPF prog-id=120 op=UNLOAD Feb 9 09:55:57.733000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.733000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.733000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.733000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.733000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.733000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.733000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.733000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.733000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.733000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:57.733000 audit: BPF prog-id=122 op=LOAD Feb 9 09:55:57.733000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000363d48 items=0 ppid=2804 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563396639373531623262383966303065643139373363356161356635 Feb 9 09:55:57.757660 env[1477]: time="2024-02-09T09:55:57.757600113Z" level=info msg="StartContainer for \"ec9f9751b2b89f00ed1973c5aa5f5777a6ae890e1cd171d8ce983acb94e9bf0c\" returns successfully" Feb 9 09:55:57.778000 audit[2942]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=2942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.778000 audit[2942]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8389c5a0 a2=0 a3=7fff8389c58c items=0 ppid=2893 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.778000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:55:57.779000 audit[2943]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=2943 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:57.779000 audit[2943]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcea75f410 a2=0 a3=7ffcea75f3fc items=0 ppid=2893 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:55:57.779000 audit[2946]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.779000 audit[2946]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffee297f70 a2=0 a3=7fffee297f5c items=0 ppid=2893 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.779000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:55:57.779000 audit[2947]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:57.779000 audit[2947]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc083fe30 a2=0 a3=7ffcc083fe1c items=0 ppid=2893 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:55:57.780000 audit[2948]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_chain pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.780000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe24cd3360 a2=0 a3=7ffe24cd334c items=0 ppid=2893 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.780000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:55:57.780000 audit[2949]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=2949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:57.780000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd91c937e0 a2=0 a3=7ffd91c937cc items=0 ppid=2893 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.780000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:55:57.884000 audit[2950]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=2950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.884000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffe07f5fb0 a2=0 a3=7fffe07f5f9c items=0 ppid=2893 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:55:57.891000 audit[2952]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=2952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.891000 audit[2952]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc996680f0 a2=0 a3=7ffc996680dc items=0 ppid=2893 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.891000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 09:55:57.900000 audit[2955]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=2955 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.900000 audit[2955]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe9c96ce20 a2=0 a3=7ffe9c96ce0c items=0 ppid=2893 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 09:55:57.903000 audit[2956]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.903000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeeaa32f30 a2=0 a3=7ffeeaa32f1c items=0 ppid=2893 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:55:57.909000 audit[2958]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.909000 audit[2958]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffdbc48d60 a2=0 a3=7fffdbc48d4c items=0 ppid=2893 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.909000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:55:57.912000 audit[2959]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=2959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.912000 audit[2959]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9599a420 a2=0 a3=7ffe9599a40c items=0 ppid=2893 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.912000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:55:57.919000 audit[2961]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.919000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc872108f0 a2=0 a3=7ffc872108dc items=0 ppid=2893 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.919000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:55:57.928000 audit[2964]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2964 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.928000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd193ee660 a2=0 a3=7ffd193ee64c items=0 ppid=2893 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.928000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 09:55:57.930000 audit[2965]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.930000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef4182f30 a2=0 a3=7ffef4182f1c items=0 ppid=2893 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.930000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:55:57.937000 audit[2967]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2967 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.937000 audit[2967]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeeb3334e0 a2=0 a3=7ffeeb3334cc items=0 ppid=2893 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.937000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:55:57.940000 audit[2968]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=2968 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.940000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe58132890 a2=0 a3=7ffe5813287c items=0 ppid=2893 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:55:57.946000 audit[2970]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.946000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe14f15240 a2=0 a3=7ffe14f1522c items=0 ppid=2893 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:55:57.955000 audit[2973]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.955000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9ac47c60 a2=0 a3=7fff9ac47c4c items=0 ppid=2893 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:55:57.964000 audit[2976]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.964000 audit[2976]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe4430160 a2=0 a3=7fffe443014c items=0 ppid=2893 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:55:57.967000 audit[2977]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=2977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.967000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff83446a20 a2=0 a3=7fff83446a0c items=0 ppid=2893 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:55:57.973000 audit[2979]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=2979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.973000 audit[2979]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff6324cd30 a2=0 a3=7fff6324cd1c items=0 ppid=2893 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:55:57.982000 audit[2982]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=2982 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:57.982000 audit[2982]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff72504490 a2=0 a3=7fff7250447c items=0 ppid=2893 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:57.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:55:58.008000 audit[2986]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:55:58.008000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fff40e56240 a2=0 a3=7fff40e5622c items=0 ppid=2893 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.008000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:55:58.024000 audit[2986]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:55:58.024000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff40e56240 a2=0 a3=7fff40e5622c items=0 ppid=2893 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.024000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:55:58.107000 audit[3016]: NETFILTER_CFG table=filter:84 family=2 entries=12 op=nft_register_rule pid=3016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:55:58.107000 audit[3016]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffe49c14b70 a2=0 a3=7ffe49c14b5c items=0 ppid=2893 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:55:58.109000 audit[3016]: NETFILTER_CFG table=nat:85 family=2 entries=20 op=nft_register_rule pid=3016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:55:58.109000 audit[3016]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe49c14b70 a2=0 a3=7ffe49c14b5c items=0 ppid=2893 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.109000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:55:58.127000 audit[3017]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_chain pid=3017 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.127000 audit[3017]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe96ce2e10 a2=0 a3=7ffe96ce2dfc items=0 ppid=2893 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:55:58.134000 audit[3019]: NETFILTER_CFG table=filter:87 family=10 entries=2 op=nft_register_chain pid=3019 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.134000 audit[3019]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff3ef8f9e0 a2=0 a3=7fff3ef8f9cc items=0 ppid=2893 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.134000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 09:55:58.144000 audit[3022]: NETFILTER_CFG table=filter:88 family=10 entries=2 op=nft_register_chain pid=3022 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.144000 audit[3022]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffdfe10d20 a2=0 a3=7fffdfe10d0c items=0 ppid=2893 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 09:55:58.147000 audit[3023]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=3023 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.147000 audit[3023]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcda8477e0 a2=0 a3=7ffcda8477cc items=0 ppid=2893 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.147000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:55:58.153000 audit[3025]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=3025 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.153000 audit[3025]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd028aecc0 a2=0 a3=7ffd028aecac items=0 ppid=2893 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:55:58.156000 audit[3026]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_chain pid=3026 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.156000 audit[3026]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcccab73a0 a2=0 a3=7ffcccab738c items=0 ppid=2893 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:55:58.162000 audit[3028]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_rule pid=3028 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.162000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd95e59450 a2=0 a3=7ffd95e5943c items=0 ppid=2893 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 09:55:58.171000 audit[3031]: NETFILTER_CFG table=filter:93 family=10 entries=2 op=nft_register_chain pid=3031 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.171000 audit[3031]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd2a648340 a2=0 a3=7ffd2a64832c items=0 ppid=2893 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:55:58.173000 audit[3032]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=3032 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.173000 audit[3032]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee070f570 a2=0 a3=7ffee070f55c items=0 ppid=2893 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:55:58.179000 audit[3034]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=3034 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.179000 audit[3034]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff9d2ab0e0 a2=0 a3=7fff9d2ab0cc items=0 ppid=2893 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:55:58.182000 audit[3035]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_chain pid=3035 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.182000 audit[3035]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff73ffd6c0 a2=0 a3=7fff73ffd6ac items=0 ppid=2893 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:55:58.188000 audit[3037]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=3037 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.188000 audit[3037]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdabc1c530 a2=0 a3=7ffdabc1c51c items=0 ppid=2893 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.188000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:55:58.197000 audit[3040]: NETFILTER_CFG table=filter:98 family=10 entries=1 op=nft_register_rule pid=3040 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.197000 audit[3040]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffed409be0 a2=0 a3=7fffed409bcc items=0 ppid=2893 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.197000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:55:58.207000 audit[3043]: NETFILTER_CFG table=filter:99 family=10 entries=1 op=nft_register_rule pid=3043 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.207000 audit[3043]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8eef40f0 a2=0 a3=7ffd8eef40dc items=0 ppid=2893 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 09:55:58.209000 audit[3044]: NETFILTER_CFG table=nat:100 family=10 entries=1 op=nft_register_chain pid=3044 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.209000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd2e5b7900 a2=0 a3=7ffd2e5b78ec items=0 ppid=2893 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.209000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:55:58.215000 audit[3046]: NETFILTER_CFG table=nat:101 family=10 entries=2 op=nft_register_chain pid=3046 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.215000 audit[3046]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff858d9ce0 a2=0 a3=7fff858d9ccc items=0 ppid=2893 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:55:58.223000 audit[3049]: NETFILTER_CFG table=nat:102 family=10 entries=2 op=nft_register_chain pid=3049 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:58.223000 audit[3049]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc057353a0 a2=0 a3=7ffc0573538c items=0 ppid=2893 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:55:58.237000 audit[3053]: NETFILTER_CFG table=filter:103 family=10 entries=3 op=nft_register_rule pid=3053 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:55:58.237000 audit[3053]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcf9f1c9c0 a2=0 a3=7ffcf9f1c9ac items=0 ppid=2893 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.237000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:55:58.238000 audit[3053]: NETFILTER_CFG table=nat:104 family=10 entries=10 op=nft_register_chain pid=3053 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:55:58.238000 audit[3053]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffcf9f1c9c0 a2=0 a3=7ffcf9f1c9ac items=0 ppid=2893 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:58.238000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:55:58.610596 kubelet[2599]: I0209 09:55:58.610528 2599 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-9bdtn" podStartSLOduration=2.610447933 pod.CreationTimestamp="2024-02-09 09:55:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:55:58.610140364 +0000 UTC m=+16.120477605" watchObservedRunningTime="2024-02-09 09:55:58.610447933 +0000 UTC m=+16.120785157" Feb 9 09:55:58.900977 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3678708045.mount: Deactivated successfully. Feb 9 09:55:59.647696 env[1477]: time="2024-02-09T09:55:59.647648068Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:59.648263 env[1477]: time="2024-02-09T09:55:59.648224177Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:59.648956 env[1477]: time="2024-02-09T09:55:59.648916755Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:59.650000 env[1477]: time="2024-02-09T09:55:59.649960986Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:59.650246 env[1477]: time="2024-02-09T09:55:59.650204283Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 09:55:59.651304 env[1477]: time="2024-02-09T09:55:59.651258807Z" level=info msg="CreateContainer within sandbox \"6677e375b29eb6464eea6c04babffd8a3941da296d9891bd2b251bc8da0031f6\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 09:55:59.655384 env[1477]: time="2024-02-09T09:55:59.655339904Z" level=info msg="CreateContainer within sandbox \"6677e375b29eb6464eea6c04babffd8a3941da296d9891bd2b251bc8da0031f6\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"54b6c0e7c14510073ce1d54f11bf8b8217b2564f06b0eb26b3dd931f005c8fb7\"" Feb 9 09:55:59.655568 env[1477]: time="2024-02-09T09:55:59.655549315Z" level=info msg="StartContainer for \"54b6c0e7c14510073ce1d54f11bf8b8217b2564f06b0eb26b3dd931f005c8fb7\"" Feb 9 09:55:59.678141 systemd[1]: Started cri-containerd-54b6c0e7c14510073ce1d54f11bf8b8217b2564f06b0eb26b3dd931f005c8fb7.scope. Feb 9 09:55:59.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.683000 audit: BPF prog-id=123 op=LOAD Feb 9 09:55:59.683000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.683000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2827 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:59.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623663306537633134353130303733636531643534663131626638 Feb 9 09:55:59.683000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.683000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2827 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:59.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623663306537633134353130303733636531643534663131626638 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit: BPF prog-id=124 op=LOAD Feb 9 09:55:59.684000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c8120 items=0 ppid=2827 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:59.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623663306537633134353130303733636531643534663131626638 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit: BPF prog-id=125 op=LOAD Feb 9 09:55:59.684000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c8168 items=0 ppid=2827 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:59.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623663306537633134353130303733636531643534663131626638 Feb 9 09:55:59.684000 audit: BPF prog-id=125 op=UNLOAD Feb 9 09:55:59.684000 audit: BPF prog-id=124 op=UNLOAD Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:59.684000 audit: BPF prog-id=126 op=LOAD Feb 9 09:55:59.684000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c8578 items=0 ppid=2827 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:59.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623663306537633134353130303733636531643534663131626638 Feb 9 09:55:59.702345 env[1477]: time="2024-02-09T09:55:59.702319674Z" level=info msg="StartContainer for \"54b6c0e7c14510073ce1d54f11bf8b8217b2564f06b0eb26b3dd931f005c8fb7\" returns successfully" Feb 9 09:56:00.614836 kubelet[2599]: I0209 09:56:00.614820 2599 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-j6h9r" podStartSLOduration=-9.223372032240005e+09 pod.CreationTimestamp="2024-02-09 09:55:56 +0000 UTC" firstStartedPulling="2024-02-09 09:55:57.721572618 +0000 UTC m=+15.231909778" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:56:00.614723988 +0000 UTC m=+18.125061148" watchObservedRunningTime="2024-02-09 09:56:00.614769507 +0000 UTC m=+18.125106663" Feb 9 09:56:01.309000 audit[3131]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:01.309000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffdd2734e80 a2=0 a3=7ffdd2734e6c items=0 ppid=2893 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:01.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:01.309000 audit[3131]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:01.309000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffdd2734e80 a2=0 a3=7ffdd2734e6c items=0 ppid=2893 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:01.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:01.422000 audit[3157]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3157 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:01.422000 audit[3157]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe5871a1b0 a2=0 a3=7ffe5871a19c items=0 ppid=2893 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:01.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:01.424000 audit[3157]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=3157 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:01.424000 audit[3157]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe5871a1b0 a2=0 a3=7ffe5871a19c items=0 ppid=2893 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:01.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:01.434732 kubelet[2599]: I0209 09:56:01.434689 2599 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:56:01.441612 systemd[1]: Created slice kubepods-besteffort-pod6b37119a_a5d5_4b10_823e_d5e6ebfba29e.slice. Feb 9 09:56:01.459163 kubelet[2599]: I0209 09:56:01.459145 2599 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:56:01.462446 systemd[1]: Created slice kubepods-besteffort-pod53e8a870_7b0e_424c_91c2_435a32249991.slice. Feb 9 09:56:01.465985 kubelet[2599]: I0209 09:56:01.465937 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g8w6k\" (UniqueName: \"kubernetes.io/projected/6b37119a-a5d5-4b10-823e-d5e6ebfba29e-kube-api-access-g8w6k\") pod \"calico-typha-7fcc8d867d-ff4p4\" (UID: \"6b37119a-a5d5-4b10-823e-d5e6ebfba29e\") " pod="calico-system/calico-typha-7fcc8d867d-ff4p4" Feb 9 09:56:01.465985 kubelet[2599]: I0209 09:56:01.465962 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6b37119a-a5d5-4b10-823e-d5e6ebfba29e-tigera-ca-bundle\") pod \"calico-typha-7fcc8d867d-ff4p4\" (UID: \"6b37119a-a5d5-4b10-823e-d5e6ebfba29e\") " pod="calico-system/calico-typha-7fcc8d867d-ff4p4" Feb 9 09:56:01.465985 kubelet[2599]: I0209 09:56:01.465980 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/6b37119a-a5d5-4b10-823e-d5e6ebfba29e-typha-certs\") pod \"calico-typha-7fcc8d867d-ff4p4\" (UID: \"6b37119a-a5d5-4b10-823e-d5e6ebfba29e\") " pod="calico-system/calico-typha-7fcc8d867d-ff4p4" Feb 9 09:56:01.566948 kubelet[2599]: I0209 09:56:01.566755 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/53e8a870-7b0e-424c-91c2-435a32249991-flexvol-driver-host\") pod \"calico-node-ft7hx\" (UID: \"53e8a870-7b0e-424c-91c2-435a32249991\") " pod="calico-system/calico-node-ft7hx" Feb 9 09:56:01.566948 kubelet[2599]: I0209 09:56:01.566872 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/53e8a870-7b0e-424c-91c2-435a32249991-node-certs\") pod \"calico-node-ft7hx\" (UID: \"53e8a870-7b0e-424c-91c2-435a32249991\") " pod="calico-system/calico-node-ft7hx" Feb 9 09:56:01.567960 kubelet[2599]: I0209 09:56:01.567897 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/53e8a870-7b0e-424c-91c2-435a32249991-xtables-lock\") pod \"calico-node-ft7hx\" (UID: \"53e8a870-7b0e-424c-91c2-435a32249991\") " pod="calico-system/calico-node-ft7hx" Feb 9 09:56:01.568197 kubelet[2599]: I0209 09:56:01.568058 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/53e8a870-7b0e-424c-91c2-435a32249991-var-run-calico\") pod \"calico-node-ft7hx\" (UID: \"53e8a870-7b0e-424c-91c2-435a32249991\") " pod="calico-system/calico-node-ft7hx" Feb 9 09:56:01.568197 kubelet[2599]: I0209 09:56:01.568178 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/53e8a870-7b0e-424c-91c2-435a32249991-cni-bin-dir\") pod \"calico-node-ft7hx\" (UID: \"53e8a870-7b0e-424c-91c2-435a32249991\") " pod="calico-system/calico-node-ft7hx" Feb 9 09:56:01.568508 kubelet[2599]: I0209 09:56:01.568320 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/53e8a870-7b0e-424c-91c2-435a32249991-cni-log-dir\") pod \"calico-node-ft7hx\" (UID: \"53e8a870-7b0e-424c-91c2-435a32249991\") " pod="calico-system/calico-node-ft7hx" Feb 9 09:56:01.568678 kubelet[2599]: I0209 09:56:01.568530 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/53e8a870-7b0e-424c-91c2-435a32249991-policysync\") pod \"calico-node-ft7hx\" (UID: \"53e8a870-7b0e-424c-91c2-435a32249991\") " pod="calico-system/calico-node-ft7hx" Feb 9 09:56:01.568865 kubelet[2599]: I0209 09:56:01.568688 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/53e8a870-7b0e-424c-91c2-435a32249991-tigera-ca-bundle\") pod \"calico-node-ft7hx\" (UID: \"53e8a870-7b0e-424c-91c2-435a32249991\") " pod="calico-system/calico-node-ft7hx" Feb 9 09:56:01.568865 kubelet[2599]: I0209 09:56:01.568825 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/53e8a870-7b0e-424c-91c2-435a32249991-var-lib-calico\") pod \"calico-node-ft7hx\" (UID: \"53e8a870-7b0e-424c-91c2-435a32249991\") " pod="calico-system/calico-node-ft7hx" Feb 9 09:56:01.569212 kubelet[2599]: I0209 09:56:01.568965 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/53e8a870-7b0e-424c-91c2-435a32249991-cni-net-dir\") pod \"calico-node-ft7hx\" (UID: \"53e8a870-7b0e-424c-91c2-435a32249991\") " pod="calico-system/calico-node-ft7hx" Feb 9 09:56:01.569212 kubelet[2599]: I0209 09:56:01.569056 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gzpd8\" (UniqueName: \"kubernetes.io/projected/53e8a870-7b0e-424c-91c2-435a32249991-kube-api-access-gzpd8\") pod \"calico-node-ft7hx\" (UID: \"53e8a870-7b0e-424c-91c2-435a32249991\") " pod="calico-system/calico-node-ft7hx" Feb 9 09:56:01.569441 kubelet[2599]: I0209 09:56:01.569233 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/53e8a870-7b0e-424c-91c2-435a32249991-lib-modules\") pod \"calico-node-ft7hx\" (UID: \"53e8a870-7b0e-424c-91c2-435a32249991\") " pod="calico-system/calico-node-ft7hx" Feb 9 09:56:01.589937 kubelet[2599]: I0209 09:56:01.589872 2599 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:56:01.590675 kubelet[2599]: E0209 09:56:01.590617 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:01.670702 kubelet[2599]: I0209 09:56:01.670643 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-slw84\" (UniqueName: \"kubernetes.io/projected/ff9f79f6-c361-4d6e-b829-523c638d7830-kube-api-access-slw84\") pod \"csi-node-driver-hp56n\" (UID: \"ff9f79f6-c361-4d6e-b829-523c638d7830\") " pod="calico-system/csi-node-driver-hp56n" Feb 9 09:56:01.670702 kubelet[2599]: I0209 09:56:01.670675 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ff9f79f6-c361-4d6e-b829-523c638d7830-kubelet-dir\") pod \"csi-node-driver-hp56n\" (UID: \"ff9f79f6-c361-4d6e-b829-523c638d7830\") " pod="calico-system/csi-node-driver-hp56n" Feb 9 09:56:01.671055 kubelet[2599]: I0209 09:56:01.670772 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ff9f79f6-c361-4d6e-b829-523c638d7830-registration-dir\") pod \"csi-node-driver-hp56n\" (UID: \"ff9f79f6-c361-4d6e-b829-523c638d7830\") " pod="calico-system/csi-node-driver-hp56n" Feb 9 09:56:01.671055 kubelet[2599]: I0209 09:56:01.670997 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ff9f79f6-c361-4d6e-b829-523c638d7830-socket-dir\") pod \"csi-node-driver-hp56n\" (UID: \"ff9f79f6-c361-4d6e-b829-523c638d7830\") " pod="calico-system/csi-node-driver-hp56n" Feb 9 09:56:01.671375 kubelet[2599]: E0209 09:56:01.671341 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.671375 kubelet[2599]: W0209 09:56:01.671352 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.671375 kubelet[2599]: E0209 09:56:01.671371 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.671522 kubelet[2599]: E0209 09:56:01.671514 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.671522 kubelet[2599]: W0209 09:56:01.671521 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.671611 kubelet[2599]: E0209 09:56:01.671536 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.671703 kubelet[2599]: E0209 09:56:01.671656 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.671703 kubelet[2599]: W0209 09:56:01.671664 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.671703 kubelet[2599]: E0209 09:56:01.671674 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.671833 kubelet[2599]: E0209 09:56:01.671822 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.671833 kubelet[2599]: W0209 09:56:01.671832 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.671901 kubelet[2599]: E0209 09:56:01.671847 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.672121 kubelet[2599]: E0209 09:56:01.672090 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.672121 kubelet[2599]: W0209 09:56:01.672102 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.672121 kubelet[2599]: E0209 09:56:01.672121 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.672306 kubelet[2599]: E0209 09:56:01.672269 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.672306 kubelet[2599]: W0209 09:56:01.672280 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.672306 kubelet[2599]: E0209 09:56:01.672296 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.672472 kubelet[2599]: E0209 09:56:01.672463 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.672507 kubelet[2599]: W0209 09:56:01.672473 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.672507 kubelet[2599]: E0209 09:56:01.672491 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.672695 kubelet[2599]: E0209 09:56:01.672659 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.672695 kubelet[2599]: W0209 09:56:01.672670 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.672695 kubelet[2599]: E0209 09:56:01.672688 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.672873 kubelet[2599]: E0209 09:56:01.672835 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.672873 kubelet[2599]: W0209 09:56:01.672842 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.672873 kubelet[2599]: E0209 09:56:01.672857 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.673016 kubelet[2599]: E0209 09:56:01.672984 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.673016 kubelet[2599]: W0209 09:56:01.672992 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.673016 kubelet[2599]: E0209 09:56:01.673006 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.673115 kubelet[2599]: I0209 09:56:01.673022 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ff9f79f6-c361-4d6e-b829-523c638d7830-varrun\") pod \"csi-node-driver-hp56n\" (UID: \"ff9f79f6-c361-4d6e-b829-523c638d7830\") " pod="calico-system/csi-node-driver-hp56n" Feb 9 09:56:01.673202 kubelet[2599]: E0209 09:56:01.673193 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.673237 kubelet[2599]: W0209 09:56:01.673201 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.673237 kubelet[2599]: E0209 09:56:01.673214 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.673338 kubelet[2599]: E0209 09:56:01.673330 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.673338 kubelet[2599]: W0209 09:56:01.673337 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.673411 kubelet[2599]: E0209 09:56:01.673351 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.673472 kubelet[2599]: E0209 09:56:01.673464 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.673508 kubelet[2599]: W0209 09:56:01.673472 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.673508 kubelet[2599]: E0209 09:56:01.673486 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.673612 kubelet[2599]: E0209 09:56:01.673604 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.673612 kubelet[2599]: W0209 09:56:01.673612 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.673674 kubelet[2599]: E0209 09:56:01.673623 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.673747 kubelet[2599]: E0209 09:56:01.673740 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.673778 kubelet[2599]: W0209 09:56:01.673747 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.673778 kubelet[2599]: E0209 09:56:01.673760 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.673923 kubelet[2599]: E0209 09:56:01.673915 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.673954 kubelet[2599]: W0209 09:56:01.673923 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.673954 kubelet[2599]: E0209 09:56:01.673937 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.674049 kubelet[2599]: E0209 09:56:01.674042 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.674049 kubelet[2599]: W0209 09:56:01.674049 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.674106 kubelet[2599]: E0209 09:56:01.674062 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.674172 kubelet[2599]: E0209 09:56:01.674165 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.674204 kubelet[2599]: W0209 09:56:01.674173 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.674204 kubelet[2599]: E0209 09:56:01.674192 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.674299 kubelet[2599]: E0209 09:56:01.674291 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.674330 kubelet[2599]: W0209 09:56:01.674299 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.674330 kubelet[2599]: E0209 09:56:01.674318 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.674413 kubelet[2599]: E0209 09:56:01.674405 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.674444 kubelet[2599]: W0209 09:56:01.674413 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.674444 kubelet[2599]: E0209 09:56:01.674430 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.674525 kubelet[2599]: E0209 09:56:01.674516 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.674525 kubelet[2599]: W0209 09:56:01.674524 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.674642 kubelet[2599]: E0209 09:56:01.674542 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.674642 kubelet[2599]: E0209 09:56:01.674637 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.674711 kubelet[2599]: W0209 09:56:01.674644 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.674711 kubelet[2599]: E0209 09:56:01.674672 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.674765 kubelet[2599]: E0209 09:56:01.674759 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.674793 kubelet[2599]: W0209 09:56:01.674766 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.674793 kubelet[2599]: E0209 09:56:01.674780 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.674910 kubelet[2599]: E0209 09:56:01.674901 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.674910 kubelet[2599]: W0209 09:56:01.674909 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.674972 kubelet[2599]: E0209 09:56:01.674920 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.675049 kubelet[2599]: E0209 09:56:01.675041 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.675079 kubelet[2599]: W0209 09:56:01.675048 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.675079 kubelet[2599]: E0209 09:56:01.675059 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.675206 kubelet[2599]: E0209 09:56:01.675195 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.675238 kubelet[2599]: W0209 09:56:01.675208 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.675238 kubelet[2599]: E0209 09:56:01.675222 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.675349 kubelet[2599]: E0209 09:56:01.675341 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.675380 kubelet[2599]: W0209 09:56:01.675349 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.675380 kubelet[2599]: E0209 09:56:01.675363 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.675522 kubelet[2599]: E0209 09:56:01.675514 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.675574 kubelet[2599]: W0209 09:56:01.675523 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.675574 kubelet[2599]: E0209 09:56:01.675534 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.675692 kubelet[2599]: E0209 09:56:01.675682 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.675723 kubelet[2599]: W0209 09:56:01.675694 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.675723 kubelet[2599]: E0209 09:56:01.675709 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.675907 kubelet[2599]: E0209 09:56:01.675899 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.675943 kubelet[2599]: W0209 09:56:01.675909 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.675943 kubelet[2599]: E0209 09:56:01.675923 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.744483 env[1477]: time="2024-02-09T09:56:01.744446443Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7fcc8d867d-ff4p4,Uid:6b37119a-a5d5-4b10-823e-d5e6ebfba29e,Namespace:calico-system,Attempt:0,}" Feb 9 09:56:01.755968 env[1477]: time="2024-02-09T09:56:01.755879681Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:56:01.755968 env[1477]: time="2024-02-09T09:56:01.755919629Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:56:01.755968 env[1477]: time="2024-02-09T09:56:01.755934180Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:56:01.756192 env[1477]: time="2024-02-09T09:56:01.756092989Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8fd4acdcefe4aa9973033c83fe11414076e9b88c30d9d75b8e4180c3791dceb0 pid=3199 runtime=io.containerd.runc.v2 Feb 9 09:56:01.773467 kubelet[2599]: E0209 09:56:01.773441 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.773467 kubelet[2599]: W0209 09:56:01.773458 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.773654 kubelet[2599]: E0209 09:56:01.773478 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.773791 kubelet[2599]: E0209 09:56:01.773749 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.773791 kubelet[2599]: W0209 09:56:01.773762 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.773791 kubelet[2599]: E0209 09:56:01.773785 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.774098 kubelet[2599]: E0209 09:56:01.774055 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.774098 kubelet[2599]: W0209 09:56:01.774069 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.774098 kubelet[2599]: E0209 09:56:01.774088 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.774338 kubelet[2599]: E0209 09:56:01.774303 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.774338 kubelet[2599]: W0209 09:56:01.774314 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.774338 kubelet[2599]: E0209 09:56:01.774330 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.774568 kubelet[2599]: E0209 09:56:01.774543 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.774674 kubelet[2599]: W0209 09:56:01.774574 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.774674 kubelet[2599]: E0209 09:56:01.774599 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.774825 kubelet[2599]: E0209 09:56:01.774795 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.774825 kubelet[2599]: W0209 09:56:01.774808 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.774952 kubelet[2599]: E0209 09:56:01.774830 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.775015 kubelet[2599]: E0209 09:56:01.774999 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.775015 kubelet[2599]: W0209 09:56:01.775009 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.775130 kubelet[2599]: E0209 09:56:01.775028 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.775233 kubelet[2599]: E0209 09:56:01.775222 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.775280 kubelet[2599]: W0209 09:56:01.775232 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.775280 kubelet[2599]: E0209 09:56:01.775264 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.775393 kubelet[2599]: E0209 09:56:01.775383 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.775393 kubelet[2599]: W0209 09:56:01.775393 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.775479 kubelet[2599]: E0209 09:56:01.775416 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.775585 kubelet[2599]: E0209 09:56:01.775571 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.775585 kubelet[2599]: W0209 09:56:01.775582 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.775717 kubelet[2599]: E0209 09:56:01.775607 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.775778 kubelet[2599]: E0209 09:56:01.775756 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.775778 kubelet[2599]: W0209 09:56:01.775764 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.775869 kubelet[2599]: E0209 09:56:01.775790 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.775932 kubelet[2599]: E0209 09:56:01.775922 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.775932 kubelet[2599]: W0209 09:56:01.775931 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.776007 kubelet[2599]: E0209 09:56:01.775957 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.776091 kubelet[2599]: E0209 09:56:01.776079 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.776091 kubelet[2599]: W0209 09:56:01.776089 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.776193 kubelet[2599]: E0209 09:56:01.776104 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.776283 kubelet[2599]: E0209 09:56:01.776272 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.776335 kubelet[2599]: W0209 09:56:01.776284 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.776335 kubelet[2599]: E0209 09:56:01.776301 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.776509 kubelet[2599]: E0209 09:56:01.776495 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.776588 kubelet[2599]: W0209 09:56:01.776513 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.776588 kubelet[2599]: E0209 09:56:01.776538 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.776751 kubelet[2599]: E0209 09:56:01.776739 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.776751 kubelet[2599]: W0209 09:56:01.776751 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.776829 kubelet[2599]: E0209 09:56:01.776767 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.776930 kubelet[2599]: E0209 09:56:01.776920 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.776971 kubelet[2599]: W0209 09:56:01.776931 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.776971 kubelet[2599]: E0209 09:56:01.776956 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.777083 kubelet[2599]: E0209 09:56:01.777074 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.777127 kubelet[2599]: W0209 09:56:01.777083 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.777127 kubelet[2599]: E0209 09:56:01.777107 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.777217 kubelet[2599]: E0209 09:56:01.777207 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.777258 kubelet[2599]: W0209 09:56:01.777217 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.777258 kubelet[2599]: E0209 09:56:01.777249 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.777382 kubelet[2599]: E0209 09:56:01.777373 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.777382 kubelet[2599]: W0209 09:56:01.777382 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.777464 kubelet[2599]: E0209 09:56:01.777397 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.777626 kubelet[2599]: E0209 09:56:01.777612 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.777670 kubelet[2599]: W0209 09:56:01.777628 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.777670 kubelet[2599]: E0209 09:56:01.777656 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.777873 kubelet[2599]: E0209 09:56:01.777859 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.777938 kubelet[2599]: W0209 09:56:01.777874 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.777938 kubelet[2599]: E0209 09:56:01.777901 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.778097 kubelet[2599]: E0209 09:56:01.778086 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.778140 kubelet[2599]: W0209 09:56:01.778099 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.778140 kubelet[2599]: E0209 09:56:01.778120 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.778362 kubelet[2599]: E0209 09:56:01.778349 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.778430 kubelet[2599]: W0209 09:56:01.778362 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.778430 kubelet[2599]: E0209 09:56:01.778383 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.778603 kubelet[2599]: E0209 09:56:01.778590 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.778649 kubelet[2599]: W0209 09:56:01.778604 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.778649 kubelet[2599]: E0209 09:56:01.778624 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.778958 kubelet[2599]: E0209 09:56:01.778944 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.779021 kubelet[2599]: W0209 09:56:01.778959 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.779021 kubelet[2599]: E0209 09:56:01.778978 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.779569 systemd[1]: Started cri-containerd-8fd4acdcefe4aa9973033c83fe11414076e9b88c30d9d75b8e4180c3791dceb0.scope. Feb 9 09:56:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.791000 audit: BPF prog-id=127 op=LOAD Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3199 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:01.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866643461636463656665346161393937333033336338336665313134 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3199 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:01.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866643461636463656665346161393937333033336338336665313134 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit: BPF prog-id=128 op=LOAD Feb 9 09:56:01.792000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002966a0 items=0 ppid=3199 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:01.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866643461636463656665346161393937333033336338336665313134 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit: BPF prog-id=129 op=LOAD Feb 9 09:56:01.792000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002966e8 items=0 ppid=3199 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:01.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866643461636463656665346161393937333033336338336665313134 Feb 9 09:56:01.792000 audit: BPF prog-id=129 op=UNLOAD Feb 9 09:56:01.792000 audit: BPF prog-id=128 op=UNLOAD Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.792000 audit: BPF prog-id=130 op=LOAD Feb 9 09:56:01.792000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000296af8 items=0 ppid=3199 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:01.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866643461636463656665346161393937333033336338336665313134 Feb 9 09:56:01.838973 env[1477]: time="2024-02-09T09:56:01.838883372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7fcc8d867d-ff4p4,Uid:6b37119a-a5d5-4b10-823e-d5e6ebfba29e,Namespace:calico-system,Attempt:0,} returns sandbox id \"8fd4acdcefe4aa9973033c83fe11414076e9b88c30d9d75b8e4180c3791dceb0\"" Feb 9 09:56:01.840026 env[1477]: time="2024-02-09T09:56:01.839999230Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 09:56:01.877474 kubelet[2599]: E0209 09:56:01.877453 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.877474 kubelet[2599]: W0209 09:56:01.877472 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.877622 kubelet[2599]: E0209 09:56:01.877497 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.877739 kubelet[2599]: E0209 09:56:01.877700 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.877739 kubelet[2599]: W0209 09:56:01.877713 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.877739 kubelet[2599]: E0209 09:56:01.877731 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.978847 kubelet[2599]: E0209 09:56:01.978798 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.978847 kubelet[2599]: W0209 09:56:01.978839 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.979192 kubelet[2599]: E0209 09:56:01.978891 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:01.979463 kubelet[2599]: E0209 09:56:01.979430 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:01.979579 kubelet[2599]: W0209 09:56:01.979465 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:01.979579 kubelet[2599]: E0209 09:56:01.979522 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:02.056697 kubelet[2599]: E0209 09:56:02.056613 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:02.056697 kubelet[2599]: W0209 09:56:02.056647 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:02.056697 kubelet[2599]: E0209 09:56:02.056688 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:02.064772 env[1477]: time="2024-02-09T09:56:02.064660399Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ft7hx,Uid:53e8a870-7b0e-424c-91c2-435a32249991,Namespace:calico-system,Attempt:0,}" Feb 9 09:56:02.080444 kubelet[2599]: E0209 09:56:02.080401 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:02.080444 kubelet[2599]: W0209 09:56:02.080436 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:02.080886 kubelet[2599]: E0209 09:56:02.080477 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:02.115966 env[1477]: time="2024-02-09T09:56:02.115698594Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:56:02.115966 env[1477]: time="2024-02-09T09:56:02.115792938Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:56:02.115966 env[1477]: time="2024-02-09T09:56:02.115828408Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:56:02.116406 env[1477]: time="2024-02-09T09:56:02.116286239Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d6b8d923c88ca8de81f593c9a308b6a7fcf1283904c1076a77edb5a3e0205c1f pid=3271 runtime=io.containerd.runc.v2 Feb 9 09:56:02.155265 systemd[1]: Started cri-containerd-d6b8d923c88ca8de81f593c9a308b6a7fcf1283904c1076a77edb5a3e0205c1f.scope. Feb 9 09:56:02.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.181302 kubelet[2599]: E0209 09:56:02.181277 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:02.181302 kubelet[2599]: W0209 09:56:02.181294 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:02.181447 kubelet[2599]: E0209 09:56:02.181314 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:02.196920 kernel: kauditd_printk_skb: 411 callbacks suppressed Feb 9 09:56:02.197006 kernel: audit: type=1400 audit(1707472562.169:1105): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.262358 kubelet[2599]: E0209 09:56:02.262347 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:02.262358 kubelet[2599]: W0209 09:56:02.262356 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:02.262444 kubelet[2599]: E0209 09:56:02.262368 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:02.324535 kernel: audit: type=1400 audit(1707472562.169:1106): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324606 kernel: audit: type=1400 audit(1707472562.169:1107): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.452627 kernel: audit: type=1400 audit(1707472562.169:1108): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.452704 kernel: audit: type=1400 audit(1707472562.169:1109): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.516932 kernel: audit: type=1400 audit(1707472562.169:1110): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.581387 kernel: audit: type=1400 audit(1707472562.169:1111): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.645898 kernel: audit: type=1400 audit(1707472562.169:1112): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.710492 kernel: audit: type=1400 audit(1707472562.169:1113): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.774668 kernel: audit: type=1400 audit(1707472562.324:1114): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324000 audit: BPF prog-id=131 op=LOAD Feb 9 09:56:02.324000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3271 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:02.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436623864393233633838636138646538316635393363396133303862 Feb 9 09:56:02.324000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3271 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:02.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436623864393233633838636138646538316635393363396133303862 Feb 9 09:56:02.324000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.448000 audit[3326]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=3326 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:02.448000 audit[3326]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fffa1b52c80 a2=0 a3=7fffa1b52c6c items=0 ppid=2893 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:02.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:02.324000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.324000 audit: BPF prog-id=132 op=LOAD Feb 9 09:56:02.324000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002bd7d0 items=0 ppid=3271 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:02.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436623864393233633838636138646538316635393363396133303862 Feb 9 09:56:02.452000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.452000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.452000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.452000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.452000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.452000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.452000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.452000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.452000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.452000 audit: BPF prog-id=133 op=LOAD Feb 9 09:56:02.452000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002bd818 items=0 ppid=3271 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:02.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436623864393233633838636138646538316635393363396133303862 Feb 9 09:56:02.580000 audit: BPF prog-id=133 op=UNLOAD Feb 9 09:56:02.580000 audit: BPF prog-id=132 op=UNLOAD Feb 9 09:56:02.580000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.580000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.580000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.580000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.580000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.580000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.580000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.580000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.580000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.646000 audit[3326]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=3326 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:02.646000 audit[3326]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffa1b52c80 a2=0 a3=7fffa1b52c6c items=0 ppid=2893 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:02.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:02.580000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:02.580000 audit: BPF prog-id=134 op=LOAD Feb 9 09:56:02.580000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002bdc28 items=0 ppid=3271 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:02.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436623864393233633838636138646538316635393363396133303862 Feb 9 09:56:02.855392 env[1477]: time="2024-02-09T09:56:02.855362307Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ft7hx,Uid:53e8a870-7b0e-424c-91c2-435a32249991,Namespace:calico-system,Attempt:0,} returns sandbox id \"d6b8d923c88ca8de81f593c9a308b6a7fcf1283904c1076a77edb5a3e0205c1f\"" Feb 9 09:56:03.556941 kubelet[2599]: E0209 09:56:03.556843 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:05.556790 kubelet[2599]: E0209 09:56:05.556699 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:06.713059 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1648329379.mount: Deactivated successfully. Feb 9 09:56:07.557100 kubelet[2599]: E0209 09:56:07.557069 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:09.557209 kubelet[2599]: E0209 09:56:09.557120 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:11.557073 kubelet[2599]: E0209 09:56:11.557011 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:13.164958 env[1477]: time="2024-02-09T09:56:13.164903361Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:13.165491 env[1477]: time="2024-02-09T09:56:13.165455909Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:13.166756 env[1477]: time="2024-02-09T09:56:13.166583789Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:13.168472 env[1477]: time="2024-02-09T09:56:13.168428026Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:13.168946 env[1477]: time="2024-02-09T09:56:13.168903267Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 09:56:13.169232 env[1477]: time="2024-02-09T09:56:13.169218836Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 09:56:13.172962 env[1477]: time="2024-02-09T09:56:13.172940171Z" level=info msg="CreateContainer within sandbox \"8fd4acdcefe4aa9973033c83fe11414076e9b88c30d9d75b8e4180c3791dceb0\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 09:56:13.177575 env[1477]: time="2024-02-09T09:56:13.177545947Z" level=info msg="CreateContainer within sandbox \"8fd4acdcefe4aa9973033c83fe11414076e9b88c30d9d75b8e4180c3791dceb0\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"bf5073a36517ddcb355ef6fb06ceafd568b31d9dad2c807cefd1b07ca8d966eb\"" Feb 9 09:56:13.177802 env[1477]: time="2024-02-09T09:56:13.177787973Z" level=info msg="StartContainer for \"bf5073a36517ddcb355ef6fb06ceafd568b31d9dad2c807cefd1b07ca8d966eb\"" Feb 9 09:56:13.206172 systemd[1]: Started cri-containerd-bf5073a36517ddcb355ef6fb06ceafd568b31d9dad2c807cefd1b07ca8d966eb.scope. Feb 9 09:56:13.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.240968 kernel: kauditd_printk_skb: 53 callbacks suppressed Feb 9 09:56:13.241024 kernel: audit: type=1400 audit(1707472573.212:1125): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.368664 kernel: audit: type=1400 audit(1707472573.212:1126): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.368718 kernel: audit: type=1400 audit(1707472573.212:1127): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.496894 kernel: audit: type=1400 audit(1707472573.212:1128): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.496943 kernel: audit: type=1400 audit(1707472573.212:1129): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.556475 kubelet[2599]: E0209 09:56:13.556459 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:13.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.625644 kernel: audit: type=1400 audit(1707472573.212:1130): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.625698 kernel: audit: type=1400 audit(1707472573.212:1131): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.690557 kernel: audit: type=1400 audit(1707472573.212:1132): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.818630 kernel: audit: type=1400 audit(1707472573.212:1133): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.818666 kernel: audit: type=1400 audit(1707472573.304:1134): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit: BPF prog-id=135 op=LOAD Feb 9 09:56:13.304000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3199 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:13.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353037336133363531376464636233353565663666623036636561 Feb 9 09:56:13.304000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3199 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:13.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353037336133363531376464636233353565663666623036636561 Feb 9 09:56:13.304000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.304000 audit: BPF prog-id=136 op=LOAD Feb 9 09:56:13.304000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000245dd0 items=0 ppid=3199 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:13.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353037336133363531376464636233353565663666623036636561 Feb 9 09:56:13.431000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.431000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.431000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.431000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.431000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.431000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.431000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.431000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.431000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.431000 audit: BPF prog-id=137 op=LOAD Feb 9 09:56:13.431000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000245e18 items=0 ppid=3199 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:13.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353037336133363531376464636233353565663666623036636561 Feb 9 09:56:13.560000 audit: BPF prog-id=137 op=UNLOAD Feb 9 09:56:13.560000 audit: BPF prog-id=136 op=UNLOAD Feb 9 09:56:13.560000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.560000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.560000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.560000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.560000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.560000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.560000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.560000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.560000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.560000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:13.560000 audit: BPF prog-id=138 op=LOAD Feb 9 09:56:13.560000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000406228 items=0 ppid=3199 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:13.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353037336133363531376464636233353565663666623036636561 Feb 9 09:56:13.910504 env[1477]: time="2024-02-09T09:56:13.910449841Z" level=info msg="StartContainer for \"bf5073a36517ddcb355ef6fb06ceafd568b31d9dad2c807cefd1b07ca8d966eb\" returns successfully" Feb 9 09:56:14.650877 kubelet[2599]: E0209 09:56:14.650863 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.650877 kubelet[2599]: W0209 09:56:14.650872 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.650877 kubelet[2599]: E0209 09:56:14.650882 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.651102 kubelet[2599]: E0209 09:56:14.651023 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.651102 kubelet[2599]: W0209 09:56:14.651029 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.651102 kubelet[2599]: E0209 09:56:14.651036 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.651175 kubelet[2599]: E0209 09:56:14.651148 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.651175 kubelet[2599]: W0209 09:56:14.651155 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.651175 kubelet[2599]: E0209 09:56:14.651166 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.651304 kubelet[2599]: E0209 09:56:14.651297 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.651304 kubelet[2599]: W0209 09:56:14.651303 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.651345 kubelet[2599]: E0209 09:56:14.651309 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.651417 kubelet[2599]: E0209 09:56:14.651373 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.651417 kubelet[2599]: W0209 09:56:14.651378 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.651417 kubelet[2599]: E0209 09:56:14.651383 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.651480 kubelet[2599]: E0209 09:56:14.651442 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.651480 kubelet[2599]: W0209 09:56:14.651446 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.651480 kubelet[2599]: E0209 09:56:14.651451 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.651537 kubelet[2599]: E0209 09:56:14.651531 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.651537 kubelet[2599]: W0209 09:56:14.651536 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.651585 kubelet[2599]: E0209 09:56:14.651541 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.651610 kubelet[2599]: E0209 09:56:14.651604 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.651610 kubelet[2599]: W0209 09:56:14.651608 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.651656 kubelet[2599]: E0209 09:56:14.651614 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.651677 kubelet[2599]: E0209 09:56:14.651670 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.651677 kubelet[2599]: W0209 09:56:14.651674 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.651714 kubelet[2599]: E0209 09:56:14.651679 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.651796 kubelet[2599]: E0209 09:56:14.651747 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.651796 kubelet[2599]: W0209 09:56:14.651753 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.651796 kubelet[2599]: E0209 09:56:14.651762 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.651870 kubelet[2599]: E0209 09:56:14.651840 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.651870 kubelet[2599]: W0209 09:56:14.651846 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.651870 kubelet[2599]: E0209 09:56:14.651855 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.651973 kubelet[2599]: E0209 09:56:14.651966 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.651973 kubelet[2599]: W0209 09:56:14.651973 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.652015 kubelet[2599]: E0209 09:56:14.651981 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.652393 kubelet[2599]: I0209 09:56:14.652384 2599 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7fcc8d867d-ff4p4" podStartSLOduration=-9.22337202320241e+09 pod.CreationTimestamp="2024-02-09 09:56:01 +0000 UTC" firstStartedPulling="2024-02-09 09:56:01.839751927 +0000 UTC m=+19.350089102" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:56:14.652046731 +0000 UTC m=+32.162383892" watchObservedRunningTime="2024-02-09 09:56:14.652366119 +0000 UTC m=+32.162703276" Feb 9 09:56:14.671546 kubelet[2599]: E0209 09:56:14.671512 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.671546 kubelet[2599]: W0209 09:56:14.671520 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.671546 kubelet[2599]: E0209 09:56:14.671530 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.671760 kubelet[2599]: E0209 09:56:14.671719 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.671760 kubelet[2599]: W0209 09:56:14.671729 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.671760 kubelet[2599]: E0209 09:56:14.671741 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.671939 kubelet[2599]: E0209 09:56:14.671900 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.671939 kubelet[2599]: W0209 09:56:14.671906 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.671939 kubelet[2599]: E0209 09:56:14.671917 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.672114 kubelet[2599]: E0209 09:56:14.672075 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.672114 kubelet[2599]: W0209 09:56:14.672084 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.672114 kubelet[2599]: E0209 09:56:14.672098 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.672283 kubelet[2599]: E0209 09:56:14.672243 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.672283 kubelet[2599]: W0209 09:56:14.672249 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.672283 kubelet[2599]: E0209 09:56:14.672261 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.672371 kubelet[2599]: E0209 09:56:14.672362 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.672371 kubelet[2599]: W0209 09:56:14.672370 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.672426 kubelet[2599]: E0209 09:56:14.672382 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.672538 kubelet[2599]: E0209 09:56:14.672531 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.672573 kubelet[2599]: W0209 09:56:14.672538 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.672573 kubelet[2599]: E0209 09:56:14.672547 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.672710 kubelet[2599]: E0209 09:56:14.672702 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.672742 kubelet[2599]: W0209 09:56:14.672710 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.672742 kubelet[2599]: E0209 09:56:14.672722 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.672836 kubelet[2599]: E0209 09:56:14.672830 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.672869 kubelet[2599]: W0209 09:56:14.672836 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.672869 kubelet[2599]: E0209 09:56:14.672847 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.672966 kubelet[2599]: E0209 09:56:14.672960 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.672998 kubelet[2599]: W0209 09:56:14.672966 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.672998 kubelet[2599]: E0209 09:56:14.672975 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.673092 kubelet[2599]: E0209 09:56:14.673085 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.673092 kubelet[2599]: W0209 09:56:14.673092 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.673159 kubelet[2599]: E0209 09:56:14.673122 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.673217 kubelet[2599]: E0209 09:56:14.673211 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.673248 kubelet[2599]: W0209 09:56:14.673217 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.673248 kubelet[2599]: E0209 09:56:14.673231 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.673312 kubelet[2599]: E0209 09:56:14.673306 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.673312 kubelet[2599]: W0209 09:56:14.673312 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.673371 kubelet[2599]: E0209 09:56:14.673321 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.673451 kubelet[2599]: E0209 09:56:14.673445 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.673451 kubelet[2599]: W0209 09:56:14.673451 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.673508 kubelet[2599]: E0209 09:56:14.673459 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.673565 kubelet[2599]: E0209 09:56:14.673558 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.673565 kubelet[2599]: W0209 09:56:14.673565 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.673618 kubelet[2599]: E0209 09:56:14.673573 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.673695 kubelet[2599]: E0209 09:56:14.673689 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.673726 kubelet[2599]: W0209 09:56:14.673695 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.673726 kubelet[2599]: E0209 09:56:14.673702 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.673803 kubelet[2599]: E0209 09:56:14.673797 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.673803 kubelet[2599]: W0209 09:56:14.673803 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.673858 kubelet[2599]: E0209 09:56:14.673810 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:14.673993 kubelet[2599]: E0209 09:56:14.673987 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:14.673993 kubelet[2599]: W0209 09:56:14.673993 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:14.674048 kubelet[2599]: E0209 09:56:14.674000 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.556697 kubelet[2599]: E0209 09:56:15.556619 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:15.641022 kubelet[2599]: I0209 09:56:15.640930 2599 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 09:56:15.660040 kubelet[2599]: E0209 09:56:15.659944 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.660040 kubelet[2599]: W0209 09:56:15.659985 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.660040 kubelet[2599]: E0209 09:56:15.660040 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.661076 kubelet[2599]: E0209 09:56:15.660538 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.661076 kubelet[2599]: W0209 09:56:15.660591 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.661076 kubelet[2599]: E0209 09:56:15.660628 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.661353 kubelet[2599]: E0209 09:56:15.661143 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.661353 kubelet[2599]: W0209 09:56:15.661174 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.661353 kubelet[2599]: E0209 09:56:15.661209 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.661841 kubelet[2599]: E0209 09:56:15.661766 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.661841 kubelet[2599]: W0209 09:56:15.661797 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.661841 kubelet[2599]: E0209 09:56:15.661833 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.662396 kubelet[2599]: E0209 09:56:15.662323 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.662396 kubelet[2599]: W0209 09:56:15.662353 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.662396 kubelet[2599]: E0209 09:56:15.662389 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.662977 kubelet[2599]: E0209 09:56:15.662903 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.662977 kubelet[2599]: W0209 09:56:15.662934 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.662977 kubelet[2599]: E0209 09:56:15.662970 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.663579 kubelet[2599]: E0209 09:56:15.663508 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.663579 kubelet[2599]: W0209 09:56:15.663531 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.663579 kubelet[2599]: E0209 09:56:15.663584 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.664114 kubelet[2599]: E0209 09:56:15.664031 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.664114 kubelet[2599]: W0209 09:56:15.664061 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.664114 kubelet[2599]: E0209 09:56:15.664096 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.664610 kubelet[2599]: E0209 09:56:15.664546 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.664610 kubelet[2599]: W0209 09:56:15.664591 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.664853 kubelet[2599]: E0209 09:56:15.664623 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.665170 kubelet[2599]: E0209 09:56:15.665086 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.665170 kubelet[2599]: W0209 09:56:15.665117 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.665170 kubelet[2599]: E0209 09:56:15.665153 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.665669 kubelet[2599]: E0209 09:56:15.665605 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.665669 kubelet[2599]: W0209 09:56:15.665629 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.665669 kubelet[2599]: E0209 09:56:15.665659 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.666178 kubelet[2599]: E0209 09:56:15.666112 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.666178 kubelet[2599]: W0209 09:56:15.666143 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.666178 kubelet[2599]: E0209 09:56:15.666179 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.679808 kubelet[2599]: E0209 09:56:15.679731 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.679808 kubelet[2599]: W0209 09:56:15.679765 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.679808 kubelet[2599]: E0209 09:56:15.679801 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.680418 kubelet[2599]: E0209 09:56:15.680343 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.680418 kubelet[2599]: W0209 09:56:15.680374 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.680418 kubelet[2599]: E0209 09:56:15.680420 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.681040 kubelet[2599]: E0209 09:56:15.680961 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.681040 kubelet[2599]: W0209 09:56:15.680994 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.681040 kubelet[2599]: E0209 09:56:15.681037 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.681537 kubelet[2599]: E0209 09:56:15.681506 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.681685 kubelet[2599]: W0209 09:56:15.681538 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.681685 kubelet[2599]: E0209 09:56:15.681603 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.682189 kubelet[2599]: E0209 09:56:15.682114 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.682189 kubelet[2599]: W0209 09:56:15.682145 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.682477 kubelet[2599]: E0209 09:56:15.682265 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.682610 kubelet[2599]: E0209 09:56:15.682577 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.682610 kubelet[2599]: W0209 09:56:15.682602 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.682794 kubelet[2599]: E0209 09:56:15.682710 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.683141 kubelet[2599]: E0209 09:56:15.683066 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.683141 kubelet[2599]: W0209 09:56:15.683098 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.683436 kubelet[2599]: E0209 09:56:15.683217 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.683667 kubelet[2599]: E0209 09:56:15.683603 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.683667 kubelet[2599]: W0209 09:56:15.683632 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.683667 kubelet[2599]: E0209 09:56:15.683670 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.684335 kubelet[2599]: E0209 09:56:15.684259 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.684335 kubelet[2599]: W0209 09:56:15.684292 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.684335 kubelet[2599]: E0209 09:56:15.684333 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.684898 kubelet[2599]: E0209 09:56:15.684827 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.684898 kubelet[2599]: W0209 09:56:15.684862 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.685188 kubelet[2599]: E0209 09:56:15.684972 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.685397 kubelet[2599]: E0209 09:56:15.685342 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.685397 kubelet[2599]: W0209 09:56:15.685367 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.685648 kubelet[2599]: E0209 09:56:15.685437 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.685871 kubelet[2599]: E0209 09:56:15.685802 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.685871 kubelet[2599]: W0209 09:56:15.685834 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.686139 kubelet[2599]: E0209 09:56:15.685953 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.686260 kubelet[2599]: E0209 09:56:15.686232 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.686260 kubelet[2599]: W0209 09:56:15.686257 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.686464 kubelet[2599]: E0209 09:56:15.686299 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.686890 kubelet[2599]: E0209 09:56:15.686815 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.686890 kubelet[2599]: W0209 09:56:15.686847 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.686890 kubelet[2599]: E0209 09:56:15.686890 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.687457 kubelet[2599]: E0209 09:56:15.687405 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.687457 kubelet[2599]: W0209 09:56:15.687436 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.687723 kubelet[2599]: E0209 09:56:15.687482 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.688076 kubelet[2599]: E0209 09:56:15.688017 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.688076 kubelet[2599]: W0209 09:56:15.688052 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.688348 kubelet[2599]: E0209 09:56:15.688098 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.688646 kubelet[2599]: E0209 09:56:15.688616 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.688785 kubelet[2599]: W0209 09:56:15.688645 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.688785 kubelet[2599]: E0209 09:56:15.688680 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:15.689226 kubelet[2599]: E0209 09:56:15.689195 2599 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:15.689332 kubelet[2599]: W0209 09:56:15.689228 2599 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:15.689332 kubelet[2599]: E0209 09:56:15.689265 2599 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:17.557082 kubelet[2599]: E0209 09:56:17.556971 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:19.556657 kubelet[2599]: E0209 09:56:19.556593 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:21.557390 kubelet[2599]: E0209 09:56:21.557278 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:21.636708 env[1477]: time="2024-02-09T09:56:21.636652661Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:21.637302 env[1477]: time="2024-02-09T09:56:21.637287700Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:21.638660 env[1477]: time="2024-02-09T09:56:21.638646942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:21.639627 env[1477]: time="2024-02-09T09:56:21.639614976Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:21.640619 env[1477]: time="2024-02-09T09:56:21.640590567Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 09:56:21.641464 env[1477]: time="2024-02-09T09:56:21.641452363Z" level=info msg="CreateContainer within sandbox \"d6b8d923c88ca8de81f593c9a308b6a7fcf1283904c1076a77edb5a3e0205c1f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 09:56:21.647122 env[1477]: time="2024-02-09T09:56:21.647057556Z" level=info msg="CreateContainer within sandbox \"d6b8d923c88ca8de81f593c9a308b6a7fcf1283904c1076a77edb5a3e0205c1f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3648a9cd4ff88b821ee7f7d2fea2da0fceda2c9c6590726753792defb19c14da\"" Feb 9 09:56:21.647405 env[1477]: time="2024-02-09T09:56:21.647368487Z" level=info msg="StartContainer for \"3648a9cd4ff88b821ee7f7d2fea2da0fceda2c9c6590726753792defb19c14da\"" Feb 9 09:56:21.670025 systemd[1]: Started cri-containerd-3648a9cd4ff88b821ee7f7d2fea2da0fceda2c9c6590726753792defb19c14da.scope. Feb 9 09:56:21.675000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.704536 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 9 09:56:21.704622 kernel: audit: type=1400 audit(1707472581.675:1143): avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.675000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3271 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.864684 kernel: audit: type=1300 audit(1707472581.675:1143): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3271 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.864724 kernel: audit: type=1327 audit(1707472581.675:1143): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336343861396364346666383862383231656537663764326665613264 Feb 9 09:56:21.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336343861396364346666383862383231656537663764326665613264 Feb 9 09:56:21.958358 kernel: audit: type=1400 audit(1707472581.675:1144): avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.675000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:22.022160 kernel: audit: type=1400 audit(1707472581.675:1144): avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.675000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:22.085948 kernel: audit: type=1400 audit(1707472581.675:1144): avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.675000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:22.149815 kernel: audit: type=1400 audit(1707472581.675:1144): avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.675000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:22.214003 kernel: audit: type=1400 audit(1707472581.675:1144): avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.675000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:22.228450 env[1477]: time="2024-02-09T09:56:22.228431903Z" level=info msg="StartContainer for \"3648a9cd4ff88b821ee7f7d2fea2da0fceda2c9c6590726753792defb19c14da\" returns successfully" Feb 9 09:56:22.278176 kernel: audit: type=1400 audit(1707472581.675:1144): avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.675000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:22.278394 systemd[1]: cri-containerd-3648a9cd4ff88b821ee7f7d2fea2da0fceda2c9c6590726753792defb19c14da.scope: Deactivated successfully. Feb 9 09:56:22.342358 kernel: audit: type=1400 audit(1707472581.675:1144): avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.675000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:22.372171 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3648a9cd4ff88b821ee7f7d2fea2da0fceda2c9c6590726753792defb19c14da-rootfs.mount: Deactivated successfully. Feb 9 09:56:21.675000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.675000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.675000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.675000 audit: BPF prog-id=139 op=LOAD Feb 9 09:56:21.675000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038a250 items=0 ppid=3271 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336343861396364346666383862383231656537663764326665613264 Feb 9 09:56:21.767000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.767000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.767000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.767000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.767000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.767000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.767000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.767000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.767000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.767000 audit: BPF prog-id=140 op=LOAD Feb 9 09:56:21.767000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038a298 items=0 ppid=3271 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336343861396364346666383862383231656537663764326665613264 Feb 9 09:56:21.956000 audit: BPF prog-id=140 op=UNLOAD Feb 9 09:56:21.956000 audit: BPF prog-id=139 op=UNLOAD Feb 9 09:56:21.956000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.956000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.956000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.956000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.956000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.956000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.956000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.956000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.956000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.956000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.956000 audit: BPF prog-id=141 op=LOAD Feb 9 09:56:21.956000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038a328 items=0 ppid=3271 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336343861396364346666383862383231656537663764326665613264 Feb 9 09:56:22.411000 audit: BPF prog-id=141 op=UNLOAD Feb 9 09:56:22.819865 env[1477]: time="2024-02-09T09:56:22.819712975Z" level=info msg="shim disconnected" id=3648a9cd4ff88b821ee7f7d2fea2da0fceda2c9c6590726753792defb19c14da Feb 9 09:56:22.819865 env[1477]: time="2024-02-09T09:56:22.819837229Z" level=warning msg="cleaning up after shim disconnected" id=3648a9cd4ff88b821ee7f7d2fea2da0fceda2c9c6590726753792defb19c14da namespace=k8s.io Feb 9 09:56:22.820884 env[1477]: time="2024-02-09T09:56:22.819880182Z" level=info msg="cleaning up dead shim" Feb 9 09:56:22.837610 env[1477]: time="2024-02-09T09:56:22.837488867Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:56:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3500 runtime=io.containerd.runc.v2\n" Feb 9 09:56:23.557602 kubelet[2599]: E0209 09:56:23.557508 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:23.667977 env[1477]: time="2024-02-09T09:56:23.667883458Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 09:56:25.556539 kubelet[2599]: E0209 09:56:25.556439 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:27.322838 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3037723111.mount: Deactivated successfully. Feb 9 09:56:27.557595 kubelet[2599]: E0209 09:56:27.557473 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:29.557370 kubelet[2599]: E0209 09:56:29.557308 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:30.404437 kubelet[2599]: I0209 09:56:30.404370 2599 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 09:56:30.447000 audit[3541]: NETFILTER_CFG table=filter:111 family=2 entries=13 op=nft_register_rule pid=3541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:30.476213 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 09:56:30.476260 kernel: audit: type=1325 audit(1707472590.447:1150): table=filter:111 family=2 entries=13 op=nft_register_rule pid=3541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:30.447000 audit[3541]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffcd4ea9090 a2=0 a3=7ffcd4ea907c items=0 ppid=2893 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:30.536615 kernel: audit: type=1300 audit(1707472590.447:1150): arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffcd4ea9090 a2=0 a3=7ffcd4ea907c items=0 ppid=2893 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:30.447000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:30.692937 kernel: audit: type=1327 audit(1707472590.447:1150): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:30.448000 audit[3541]: NETFILTER_CFG table=nat:112 family=2 entries=27 op=nft_register_chain pid=3541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:30.448000 audit[3541]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffcd4ea9090 a2=0 a3=7ffcd4ea907c items=0 ppid=2893 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:30.855761 kernel: audit: type=1325 audit(1707472590.448:1151): table=nat:112 family=2 entries=27 op=nft_register_chain pid=3541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:30.855831 kernel: audit: type=1300 audit(1707472590.448:1151): arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffcd4ea9090 a2=0 a3=7ffcd4ea907c items=0 ppid=2893 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:30.855870 kernel: audit: type=1327 audit(1707472590.448:1151): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:30.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:31.557457 kubelet[2599]: E0209 09:56:31.557345 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:33.557572 kubelet[2599]: E0209 09:56:33.557398 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:35.556979 kubelet[2599]: E0209 09:56:35.556917 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:37.557082 kubelet[2599]: E0209 09:56:37.556978 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:38.748000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:38.748000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:38.934817 kernel: audit: type=1400 audit(1707472598.748:1153): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:38.934864 kernel: audit: type=1400 audit(1707472598.748:1152): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:38.934880 kernel: audit: type=1300 audit(1707472598.748:1153): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000addc80 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:56:38.748000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000addc80 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:56:38.748000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00248e820 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:56:39.178295 kernel: audit: type=1300 audit(1707472598.748:1152): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00248e820 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:56:39.178353 kernel: audit: type=1327 audit(1707472598.748:1153): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:38.748000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:38.748000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:39.366980 kernel: audit: type=1327 audit(1707472598.748:1152): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:39.367033 kernel: audit: type=1400 audit(1707472598.804:1154): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:38.804000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:39.459081 kernel: audit: type=1300 audit(1707472598.804:1154): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002df65d0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:56:38.804000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002df65d0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:56:39.557196 kubelet[2599]: E0209 09:56:39.557154 2599 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:38.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:56:39.652145 kernel: audit: type=1327 audit(1707472598.804:1154): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:56:39.652211 kernel: audit: type=1400 audit(1707472598.804:1155): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:38.804000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:38.804000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c004ebb920 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:56:38.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:56:38.804000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:38.804000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0031fc540 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:56:38.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:56:38.805000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:38.805000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c004fb22d0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:56:38.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:56:38.807000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:38.807000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002e40940 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:56:38.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:56:38.819000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:38.819000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c004ebb980 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:56:38.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:56:40.610970 env[1477]: time="2024-02-09T09:56:40.610872622Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:40.612391 env[1477]: time="2024-02-09T09:56:40.612322264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:40.615050 env[1477]: time="2024-02-09T09:56:40.614980708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:40.617600 env[1477]: time="2024-02-09T09:56:40.617539959Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:40.618956 env[1477]: time="2024-02-09T09:56:40.618888713Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 09:56:40.621337 env[1477]: time="2024-02-09T09:56:40.621289729Z" level=info msg="CreateContainer within sandbox \"d6b8d923c88ca8de81f593c9a308b6a7fcf1283904c1076a77edb5a3e0205c1f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 09:56:40.630655 env[1477]: time="2024-02-09T09:56:40.630581163Z" level=info msg="CreateContainer within sandbox \"d6b8d923c88ca8de81f593c9a308b6a7fcf1283904c1076a77edb5a3e0205c1f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"dbd598b2fec1a92330ea65d5d47c175a7eebb8d14d31a3f6fcb7cf84e0fc90f0\"" Feb 9 09:56:40.631110 env[1477]: time="2024-02-09T09:56:40.631040553Z" level=info msg="StartContainer for \"dbd598b2fec1a92330ea65d5d47c175a7eebb8d14d31a3f6fcb7cf84e0fc90f0\"" Feb 9 09:56:40.653796 systemd[1]: Started cri-containerd-dbd598b2fec1a92330ea65d5d47c175a7eebb8d14d31a3f6fcb7cf84e0fc90f0.scope. Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3271 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:40.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462643539386232666563316139323333306561363564356434376331 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit: BPF prog-id=142 op=LOAD Feb 9 09:56:40.659000 audit[3550]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000273c70 items=0 ppid=3271 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:40.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462643539386232666563316139323333306561363564356434376331 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.659000 audit: BPF prog-id=143 op=LOAD Feb 9 09:56:40.659000 audit[3550]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000273cb8 items=0 ppid=3271 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:40.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462643539386232666563316139323333306561363564356434376331 Feb 9 09:56:40.660000 audit: BPF prog-id=143 op=UNLOAD Feb 9 09:56:40.660000 audit: BPF prog-id=142 op=UNLOAD Feb 9 09:56:40.660000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.660000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.660000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.660000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.660000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.660000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.660000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.660000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.660000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.660000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:40.660000 audit: BPF prog-id=144 op=LOAD Feb 9 09:56:40.660000 audit[3550]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000273d48 items=0 ppid=3271 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:40.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462643539386232666563316139323333306561363564356434376331 Feb 9 09:56:40.667945 env[1477]: time="2024-02-09T09:56:40.667920519Z" level=info msg="StartContainer for \"dbd598b2fec1a92330ea65d5d47c175a7eebb8d14d31a3f6fcb7cf84e0fc90f0\" returns successfully" Feb 9 09:56:41.385237 systemd[1]: cri-containerd-dbd598b2fec1a92330ea65d5d47c175a7eebb8d14d31a3f6fcb7cf84e0fc90f0.scope: Deactivated successfully. Feb 9 09:56:41.402000 audit: BPF prog-id=144 op=UNLOAD Feb 9 09:56:41.443228 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dbd598b2fec1a92330ea65d5d47c175a7eebb8d14d31a3f6fcb7cf84e0fc90f0-rootfs.mount: Deactivated successfully. Feb 9 09:56:41.479444 kubelet[2599]: I0209 09:56:41.479381 2599 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 09:56:41.513514 kubelet[2599]: I0209 09:56:41.513445 2599 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:56:41.515405 kubelet[2599]: I0209 09:56:41.515352 2599 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:56:41.516844 kubelet[2599]: I0209 09:56:41.516797 2599 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:56:41.527253 systemd[1]: Created slice kubepods-burstable-podee9dcfdb_fb61_4be4_9821_f2da6b546baa.slice. Feb 9 09:56:41.540212 systemd[1]: Created slice kubepods-besteffort-pod86f8e619_cd35_46e0_b241_8ce4a323f389.slice. Feb 9 09:56:41.550666 systemd[1]: Created slice kubepods-burstable-pod045ae4c6_7f62_4e3b_a026_fbc7ad050ea3.slice. Feb 9 09:56:41.557811 kubelet[2599]: I0209 09:56:41.557790 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ee9dcfdb-fb61-4be4-9821-f2da6b546baa-config-volume\") pod \"coredns-787d4945fb-d5lzv\" (UID: \"ee9dcfdb-fb61-4be4-9821-f2da6b546baa\") " pod="kube-system/coredns-787d4945fb-d5lzv" Feb 9 09:56:41.557931 kubelet[2599]: I0209 09:56:41.557848 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/045ae4c6-7f62-4e3b-a026-fbc7ad050ea3-config-volume\") pod \"coredns-787d4945fb-n2txl\" (UID: \"045ae4c6-7f62-4e3b-a026-fbc7ad050ea3\") " pod="kube-system/coredns-787d4945fb-n2txl" Feb 9 09:56:41.557989 kubelet[2599]: I0209 09:56:41.557955 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rw87x\" (UniqueName: \"kubernetes.io/projected/86f8e619-cd35-46e0-b241-8ce4a323f389-kube-api-access-rw87x\") pod \"calico-kube-controllers-57dd9d46cc-hc6pw\" (UID: \"86f8e619-cd35-46e0-b241-8ce4a323f389\") " pod="calico-system/calico-kube-controllers-57dd9d46cc-hc6pw" Feb 9 09:56:41.558048 kubelet[2599]: I0209 09:56:41.558006 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zl8zt\" (UniqueName: \"kubernetes.io/projected/ee9dcfdb-fb61-4be4-9821-f2da6b546baa-kube-api-access-zl8zt\") pod \"coredns-787d4945fb-d5lzv\" (UID: \"ee9dcfdb-fb61-4be4-9821-f2da6b546baa\") " pod="kube-system/coredns-787d4945fb-d5lzv" Feb 9 09:56:41.558096 kubelet[2599]: I0209 09:56:41.558057 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rt7nd\" (UniqueName: \"kubernetes.io/projected/045ae4c6-7f62-4e3b-a026-fbc7ad050ea3-kube-api-access-rt7nd\") pod \"coredns-787d4945fb-n2txl\" (UID: \"045ae4c6-7f62-4e3b-a026-fbc7ad050ea3\") " pod="kube-system/coredns-787d4945fb-n2txl" Feb 9 09:56:41.558142 kubelet[2599]: I0209 09:56:41.558110 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/86f8e619-cd35-46e0-b241-8ce4a323f389-tigera-ca-bundle\") pod \"calico-kube-controllers-57dd9d46cc-hc6pw\" (UID: \"86f8e619-cd35-46e0-b241-8ce4a323f389\") " pod="calico-system/calico-kube-controllers-57dd9d46cc-hc6pw" Feb 9 09:56:41.561617 systemd[1]: Created slice kubepods-besteffort-podff9f79f6_c361_4d6e_b829_523c638d7830.slice. Feb 9 09:56:41.563374 env[1477]: time="2024-02-09T09:56:41.563324019Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hp56n,Uid:ff9f79f6-c361-4d6e-b829-523c638d7830,Namespace:calico-system,Attempt:0,}" Feb 9 09:56:41.833210 env[1477]: time="2024-02-09T09:56:41.833094720Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-d5lzv,Uid:ee9dcfdb-fb61-4be4-9821-f2da6b546baa,Namespace:kube-system,Attempt:0,}" Feb 9 09:56:41.847256 env[1477]: time="2024-02-09T09:56:41.847190663Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57dd9d46cc-hc6pw,Uid:86f8e619-cd35-46e0-b241-8ce4a323f389,Namespace:calico-system,Attempt:0,}" Feb 9 09:56:41.854350 env[1477]: time="2024-02-09T09:56:41.854284339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-n2txl,Uid:045ae4c6-7f62-4e3b-a026-fbc7ad050ea3,Namespace:kube-system,Attempt:0,}" Feb 9 09:56:41.932967 env[1477]: time="2024-02-09T09:56:41.932874553Z" level=info msg="shim disconnected" id=dbd598b2fec1a92330ea65d5d47c175a7eebb8d14d31a3f6fcb7cf84e0fc90f0 Feb 9 09:56:41.932967 env[1477]: time="2024-02-09T09:56:41.932962990Z" level=warning msg="cleaning up after shim disconnected" id=dbd598b2fec1a92330ea65d5d47c175a7eebb8d14d31a3f6fcb7cf84e0fc90f0 namespace=k8s.io Feb 9 09:56:41.933344 env[1477]: time="2024-02-09T09:56:41.932990572Z" level=info msg="cleaning up dead shim" Feb 9 09:56:41.956915 env[1477]: time="2024-02-09T09:56:41.956818873Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:56:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3615 runtime=io.containerd.runc.v2\n" Feb 9 09:56:42.026920 env[1477]: time="2024-02-09T09:56:42.026865164Z" level=error msg="Failed to destroy network for sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.027145 env[1477]: time="2024-02-09T09:56:42.027121770Z" level=error msg="encountered an error cleaning up failed sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.027209 env[1477]: time="2024-02-09T09:56:42.027162115Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hp56n,Uid:ff9f79f6-c361-4d6e-b829-523c638d7830,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.027362 kubelet[2599]: E0209 09:56:42.027345 2599 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.027454 kubelet[2599]: E0209 09:56:42.027390 2599 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hp56n" Feb 9 09:56:42.027454 kubelet[2599]: E0209 09:56:42.027409 2599 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hp56n" Feb 9 09:56:42.027454 kubelet[2599]: E0209 09:56:42.027449 2599 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-hp56n_calico-system(ff9f79f6-c361-4d6e-b829-523c638d7830)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-hp56n_calico-system(ff9f79f6-c361-4d6e-b829-523c638d7830)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:42.028770 env[1477]: time="2024-02-09T09:56:42.028715566Z" level=error msg="Failed to destroy network for sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.028982 env[1477]: time="2024-02-09T09:56:42.028962117Z" level=error msg="encountered an error cleaning up failed sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.029029 env[1477]: time="2024-02-09T09:56:42.028998013Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57dd9d46cc-hc6pw,Uid:86f8e619-cd35-46e0-b241-8ce4a323f389,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.029122 kubelet[2599]: E0209 09:56:42.029111 2599 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.029166 kubelet[2599]: E0209 09:56:42.029142 2599 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-57dd9d46cc-hc6pw" Feb 9 09:56:42.029166 kubelet[2599]: E0209 09:56:42.029158 2599 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-57dd9d46cc-hc6pw" Feb 9 09:56:42.029225 kubelet[2599]: E0209 09:56:42.029191 2599 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-57dd9d46cc-hc6pw_calico-system(86f8e619-cd35-46e0-b241-8ce4a323f389)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-57dd9d46cc-hc6pw_calico-system(86f8e619-cd35-46e0-b241-8ce4a323f389)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-57dd9d46cc-hc6pw" podUID=86f8e619-cd35-46e0-b241-8ce4a323f389 Feb 9 09:56:42.029811 env[1477]: time="2024-02-09T09:56:42.029787288Z" level=error msg="Failed to destroy network for sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.030009 env[1477]: time="2024-02-09T09:56:42.029992644Z" level=error msg="encountered an error cleaning up failed sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.030039 env[1477]: time="2024-02-09T09:56:42.030020707Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-n2txl,Uid:045ae4c6-7f62-4e3b-a026-fbc7ad050ea3,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.030140 kubelet[2599]: E0209 09:56:42.030132 2599 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.030181 kubelet[2599]: E0209 09:56:42.030157 2599 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-n2txl" Feb 9 09:56:42.030181 kubelet[2599]: E0209 09:56:42.030172 2599 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-n2txl" Feb 9 09:56:42.030240 kubelet[2599]: E0209 09:56:42.030200 2599 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-n2txl_kube-system(045ae4c6-7f62-4e3b-a026-fbc7ad050ea3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-n2txl_kube-system(045ae4c6-7f62-4e3b-a026-fbc7ad050ea3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-n2txl" podUID=045ae4c6-7f62-4e3b-a026-fbc7ad050ea3 Feb 9 09:56:42.033842 env[1477]: time="2024-02-09T09:56:42.033789676Z" level=error msg="Failed to destroy network for sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.034003 env[1477]: time="2024-02-09T09:56:42.033959875Z" level=error msg="encountered an error cleaning up failed sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.034003 env[1477]: time="2024-02-09T09:56:42.033987214Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-d5lzv,Uid:ee9dcfdb-fb61-4be4-9821-f2da6b546baa,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.034120 kubelet[2599]: E0209 09:56:42.034109 2599 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.034176 kubelet[2599]: E0209 09:56:42.034134 2599 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-d5lzv" Feb 9 09:56:42.034176 kubelet[2599]: E0209 09:56:42.034155 2599 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-d5lzv" Feb 9 09:56:42.034262 kubelet[2599]: E0209 09:56:42.034185 2599 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-d5lzv_kube-system(ee9dcfdb-fb61-4be4-9821-f2da6b546baa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-d5lzv_kube-system(ee9dcfdb-fb61-4be4-9821-f2da6b546baa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-d5lzv" podUID=ee9dcfdb-fb61-4be4-9821-f2da6b546baa Feb 9 09:56:42.683858 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c-shm.mount: Deactivated successfully. Feb 9 09:56:42.683905 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc-shm.mount: Deactivated successfully. Feb 9 09:56:42.683938 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb-shm.mount: Deactivated successfully. Feb 9 09:56:42.722261 kubelet[2599]: I0209 09:56:42.722217 2599 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:56:42.722655 env[1477]: time="2024-02-09T09:56:42.722607477Z" level=info msg="StopPodSandbox for \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\"" Feb 9 09:56:42.722751 kubelet[2599]: I0209 09:56:42.722741 2599 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:56:42.723068 env[1477]: time="2024-02-09T09:56:42.723047623Z" level=info msg="StopPodSandbox for \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\"" Feb 9 09:56:42.723401 kubelet[2599]: I0209 09:56:42.723386 2599 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:56:42.723767 env[1477]: time="2024-02-09T09:56:42.723743335Z" level=info msg="StopPodSandbox for \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\"" Feb 9 09:56:42.725429 kubelet[2599]: I0209 09:56:42.725405 2599 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:56:42.725545 env[1477]: time="2024-02-09T09:56:42.725484095Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 09:56:42.725745 env[1477]: time="2024-02-09T09:56:42.725722581Z" level=info msg="StopPodSandbox for \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\"" Feb 9 09:56:42.740029 env[1477]: time="2024-02-09T09:56:42.739986814Z" level=error msg="StopPodSandbox for \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\" failed" error="failed to destroy network for sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.740153 kubelet[2599]: E0209 09:56:42.740142 2599 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:56:42.740188 kubelet[2599]: E0209 09:56:42.740183 2599 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc} Feb 9 09:56:42.740223 kubelet[2599]: E0209 09:56:42.740218 2599 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"86f8e619-cd35-46e0-b241-8ce4a323f389\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:56:42.740272 kubelet[2599]: E0209 09:56:42.740245 2599 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"86f8e619-cd35-46e0-b241-8ce4a323f389\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-57dd9d46cc-hc6pw" podUID=86f8e619-cd35-46e0-b241-8ce4a323f389 Feb 9 09:56:42.740443 env[1477]: time="2024-02-09T09:56:42.740425062Z" level=error msg="StopPodSandbox for \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\" failed" error="failed to destroy network for sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.740505 kubelet[2599]: E0209 09:56:42.740497 2599 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:56:42.740529 kubelet[2599]: E0209 09:56:42.740513 2599 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb} Feb 9 09:56:42.740548 kubelet[2599]: E0209 09:56:42.740537 2599 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ff9f79f6-c361-4d6e-b829-523c638d7830\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:56:42.740593 kubelet[2599]: E0209 09:56:42.740557 2599 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ff9f79f6-c361-4d6e-b829-523c638d7830\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:42.741200 env[1477]: time="2024-02-09T09:56:42.741179414Z" level=error msg="StopPodSandbox for \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\" failed" error="failed to destroy network for sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.741262 env[1477]: time="2024-02-09T09:56:42.741246168Z" level=error msg="StopPodSandbox for \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\" failed" error="failed to destroy network for sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:42.741294 kubelet[2599]: E0209 09:56:42.741269 2599 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:56:42.741294 kubelet[2599]: E0209 09:56:42.741281 2599 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab} Feb 9 09:56:42.741342 kubelet[2599]: E0209 09:56:42.741299 2599 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"045ae4c6-7f62-4e3b-a026-fbc7ad050ea3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:56:42.741342 kubelet[2599]: E0209 09:56:42.741319 2599 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"045ae4c6-7f62-4e3b-a026-fbc7ad050ea3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-n2txl" podUID=045ae4c6-7f62-4e3b-a026-fbc7ad050ea3 Feb 9 09:56:42.741342 kubelet[2599]: E0209 09:56:42.741321 2599 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:56:42.741342 kubelet[2599]: E0209 09:56:42.741335 2599 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c} Feb 9 09:56:42.741451 kubelet[2599]: E0209 09:56:42.741353 2599 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ee9dcfdb-fb61-4be4-9821-f2da6b546baa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:56:42.741451 kubelet[2599]: E0209 09:56:42.741367 2599 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ee9dcfdb-fb61-4be4-9821-f2da6b546baa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-d5lzv" podUID=ee9dcfdb-fb61-4be4-9821-f2da6b546baa Feb 9 09:56:42.791000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:42.791000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:42.791000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002686780 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:56:42.791000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002973020 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:56:42.791000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:42.791000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:42.791000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:42.791000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025820c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:56:42.791000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:42.792000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:42.792000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00248fcc0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:56:42.792000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:53.563402 env[1477]: time="2024-02-09T09:56:53.563300843Z" level=info msg="StopPodSandbox for \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\"" Feb 9 09:56:53.563402 env[1477]: time="2024-02-09T09:56:53.563354470Z" level=info msg="StopPodSandbox for \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\"" Feb 9 09:56:53.590015 env[1477]: time="2024-02-09T09:56:53.589939724Z" level=error msg="StopPodSandbox for \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\" failed" error="failed to destroy network for sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:53.590159 env[1477]: time="2024-02-09T09:56:53.590046857Z" level=error msg="StopPodSandbox for \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\" failed" error="failed to destroy network for sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:53.590200 kubelet[2599]: E0209 09:56:53.590158 2599 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:56:53.590200 kubelet[2599]: E0209 09:56:53.590168 2599 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:56:53.590361 kubelet[2599]: E0209 09:56:53.590202 2599 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc} Feb 9 09:56:53.590361 kubelet[2599]: E0209 09:56:53.590202 2599 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab} Feb 9 09:56:53.590361 kubelet[2599]: E0209 09:56:53.590223 2599 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"86f8e619-cd35-46e0-b241-8ce4a323f389\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:56:53.590361 kubelet[2599]: E0209 09:56:53.590222 2599 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"045ae4c6-7f62-4e3b-a026-fbc7ad050ea3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:56:53.590361 kubelet[2599]: E0209 09:56:53.590240 2599 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"86f8e619-cd35-46e0-b241-8ce4a323f389\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-57dd9d46cc-hc6pw" podUID=86f8e619-cd35-46e0-b241-8ce4a323f389 Feb 9 09:56:53.590494 kubelet[2599]: E0209 09:56:53.590240 2599 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"045ae4c6-7f62-4e3b-a026-fbc7ad050ea3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-n2txl" podUID=045ae4c6-7f62-4e3b-a026-fbc7ad050ea3 Feb 9 09:56:56.557710 env[1477]: time="2024-02-09T09:56:56.557609848Z" level=info msg="StopPodSandbox for \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\"" Feb 9 09:56:56.584658 env[1477]: time="2024-02-09T09:56:56.584564176Z" level=error msg="StopPodSandbox for \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\" failed" error="failed to destroy network for sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:56.584895 kubelet[2599]: E0209 09:56:56.584827 2599 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:56:56.584895 kubelet[2599]: E0209 09:56:56.584872 2599 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb} Feb 9 09:56:56.585078 kubelet[2599]: E0209 09:56:56.584923 2599 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ff9f79f6-c361-4d6e-b829-523c638d7830\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:56:56.585078 kubelet[2599]: E0209 09:56:56.584942 2599 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ff9f79f6-c361-4d6e-b829-523c638d7830\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hp56n" podUID=ff9f79f6-c361-4d6e-b829-523c638d7830 Feb 9 09:56:57.557237 env[1477]: time="2024-02-09T09:56:57.557178622Z" level=info msg="StopPodSandbox for \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\"" Feb 9 09:56:57.570802 env[1477]: time="2024-02-09T09:56:57.570725624Z" level=error msg="StopPodSandbox for \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\" failed" error="failed to destroy network for sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:56:57.571049 kubelet[2599]: E0209 09:56:57.570955 2599 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:56:57.571049 kubelet[2599]: E0209 09:56:57.570980 2599 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c} Feb 9 09:56:57.571049 kubelet[2599]: E0209 09:56:57.571001 2599 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ee9dcfdb-fb61-4be4-9821-f2da6b546baa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:56:57.571049 kubelet[2599]: E0209 09:56:57.571017 2599 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ee9dcfdb-fb61-4be4-9821-f2da6b546baa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-d5lzv" podUID=ee9dcfdb-fb61-4be4-9821-f2da6b546baa Feb 9 09:56:59.577775 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3132180069.mount: Deactivated successfully. Feb 9 09:56:59.600751 env[1477]: time="2024-02-09T09:56:59.600709549Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:59.601281 env[1477]: time="2024-02-09T09:56:59.601241617Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:59.601924 env[1477]: time="2024-02-09T09:56:59.601883557Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:59.602659 env[1477]: time="2024-02-09T09:56:59.602619509Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:59.603227 env[1477]: time="2024-02-09T09:56:59.603183818Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 09:56:59.607290 env[1477]: time="2024-02-09T09:56:59.607231749Z" level=info msg="CreateContainer within sandbox \"d6b8d923c88ca8de81f593c9a308b6a7fcf1283904c1076a77edb5a3e0205c1f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 09:56:59.634428 env[1477]: time="2024-02-09T09:56:59.634305981Z" level=info msg="CreateContainer within sandbox \"d6b8d923c88ca8de81f593c9a308b6a7fcf1283904c1076a77edb5a3e0205c1f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"22056732fb52ef8f462e4bae40b66014e494bca5aa89fd16c1f91784b0cadaa0\"" Feb 9 09:56:59.635217 env[1477]: time="2024-02-09T09:56:59.635115159Z" level=info msg="StartContainer for \"22056732fb52ef8f462e4bae40b66014e494bca5aa89fd16c1f91784b0cadaa0\"" Feb 9 09:56:59.680973 systemd[1]: Started cri-containerd-22056732fb52ef8f462e4bae40b66014e494bca5aa89fd16c1f91784b0cadaa0.scope. Feb 9 09:56:59.711000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.740575 kernel: kauditd_printk_skb: 70 callbacks suppressed Feb 9 09:56:59.740620 kernel: audit: type=1400 audit(1707472619.711:1171): avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.711000 audit[4094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3271 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:59.804606 kernel: audit: type=1300 audit(1707472619.711:1171): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3271 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:59.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232303536373332666235326566386634363265346261653430623636 Feb 9 09:56:59.993887 kernel: audit: type=1327 audit(1707472619.711:1171): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232303536373332666235326566386634363265346261653430623636 Feb 9 09:56:59.993917 kernel: audit: type=1400 audit(1707472619.712:1172): avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.712000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.057393 kernel: audit: type=1400 audit(1707472619.712:1172): avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.712000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.121043 kernel: audit: type=1400 audit(1707472619.712:1172): avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.712000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.186157 kernel: audit: type=1400 audit(1707472619.712:1172): avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.712000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.712000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.265680 env[1477]: time="2024-02-09T09:57:00.265632653Z" level=info msg="StartContainer for \"22056732fb52ef8f462e4bae40b66014e494bca5aa89fd16c1f91784b0cadaa0\" returns successfully" Feb 9 09:57:00.315195 kernel: audit: type=1400 audit(1707472619.712:1172): avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.315262 kernel: audit: type=1400 audit(1707472619.712:1172): avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.712000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.379219 kernel: audit: type=1400 audit(1707472619.712:1172): avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.712000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.712000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.712000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.712000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.712000 audit: BPF prog-id=145 op=LOAD Feb 9 09:56:59.712000 audit[4094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000398840 items=0 ppid=3271 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:59.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232303536373332666235326566386634363265346261653430623636 Feb 9 09:56:59.802000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.802000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.802000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.802000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.802000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.802000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.802000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.802000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.802000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.802000 audit: BPF prog-id=146 op=LOAD Feb 9 09:56:59.802000 audit[4094]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000398888 items=0 ppid=3271 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:59.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232303536373332666235326566386634363265346261653430623636 Feb 9 09:56:59.993000 audit: BPF prog-id=146 op=UNLOAD Feb 9 09:56:59.993000 audit: BPF prog-id=145 op=UNLOAD Feb 9 09:56:59.993000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.993000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.993000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.993000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.993000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.993000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.993000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.993000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.993000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.993000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:59.993000 audit: BPF prog-id=147 op=LOAD Feb 9 09:56:59.993000 audit[4094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000398918 items=0 ppid=3271 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:59.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232303536373332666235326566386634363265346261653430623636 Feb 9 09:57:00.527153 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 09:57:00.527202 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 09:57:00.824643 kubelet[2599]: I0209 09:57:00.824580 2599 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-ft7hx" podStartSLOduration=-9.223371977030333e+09 pod.CreationTimestamp="2024-02-09 09:56:01 +0000 UTC" firstStartedPulling="2024-02-09 09:56:02.855820373 +0000 UTC m=+20.366157536" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:57:00.82290855 +0000 UTC m=+78.333245783" watchObservedRunningTime="2024-02-09 09:57:00.824442373 +0000 UTC m=+78.334779594" Feb 9 09:57:01.676000 audit[4243]: AVC avc: denied { write } for pid=4243 comm="tee" name="fd" dev="proc" ino=44180 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:01.676000 audit[4243]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcff77596f a2=241 a3=1b6 items=1 ppid=4209 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.676000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 09:57:01.676000 audit: PATH item=0 name="/dev/fd/63" inode=44177 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:01.676000 audit[4246]: AVC avc: denied { write } for pid=4246 comm="tee" name="fd" dev="proc" ino=32441 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:01.676000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:01.676000 audit[4246]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffecf87296d a2=241 a3=1b6 items=1 ppid=4211 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.676000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 09:57:01.676000 audit: PATH item=0 name="/dev/fd/63" inode=32438 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:01.676000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:01.676000 audit[4249]: AVC avc: denied { write } for pid=4249 comm="tee" name="fd" dev="proc" ino=41357 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:01.676000 audit[4249]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0015d96d a2=241 a3=1b6 items=1 ppid=4212 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.676000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 09:57:01.676000 audit: PATH item=0 name="/dev/fd/63" inode=16328 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:01.676000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:01.676000 audit[4253]: AVC avc: denied { write } for pid=4253 comm="tee" name="fd" dev="proc" ino=16331 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:01.676000 audit[4253]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeeb2c796e a2=241 a3=1b6 items=1 ppid=4214 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.676000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 09:57:01.676000 audit: PATH item=0 name="/dev/fd/63" inode=33316 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:01.676000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:01.677000 audit[4254]: AVC avc: denied { write } for pid=4254 comm="tee" name="fd" dev="proc" ino=40370 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:01.677000 audit[4254]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee0fbf95e a2=241 a3=1b6 items=1 ppid=4213 pid=4254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.677000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 09:57:01.677000 audit: PATH item=0 name="/dev/fd/63" inode=40367 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:01.677000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:01.677000 audit[4257]: AVC avc: denied { write } for pid=4257 comm="tee" name="fd" dev="proc" ino=39156 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:01.677000 audit[4257]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3a6a896d a2=241 a3=1b6 items=1 ppid=4208 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.677000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 09:57:01.677000 audit: PATH item=0 name="/dev/fd/63" inode=35582 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:01.677000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:01.677000 audit[4248]: AVC avc: denied { write } for pid=4248 comm="tee" name="fd" dev="proc" ino=43070 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:01.677000 audit[4248]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd02f7795d a2=241 a3=1b6 items=1 ppid=4210 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.677000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 09:57:01.677000 audit: PATH item=0 name="/dev/fd/63" inode=35581 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:01.677000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:01.764000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.764000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.764000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.764000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.764000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.764000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.764000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.764000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.764000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.764000 audit: BPF prog-id=148 op=LOAD Feb 9 09:57:01.764000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff17b1ee30 a2=70 a3=7f82c8cc8000 items=0 ppid=4220 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:57:01.765000 audit: BPF prog-id=148 op=UNLOAD Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit: BPF prog-id=149 op=LOAD Feb 9 09:57:01.765000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff17b1ee30 a2=70 a3=6e items=0 ppid=4220 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.765000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:57:01.765000 audit: BPF prog-id=149 op=UNLOAD Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff17b1ede0 a2=70 a3=7fff17b1ee30 items=0 ppid=4220 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.765000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit: BPF prog-id=150 op=LOAD Feb 9 09:57:01.765000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff17b1edc0 a2=70 a3=7fff17b1ee30 items=0 ppid=4220 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.765000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:57:01.765000 audit: BPF prog-id=150 op=UNLOAD Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff17b1eea0 a2=70 a3=0 items=0 ppid=4220 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.765000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff17b1ee90 a2=70 a3=0 items=0 ppid=4220 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.765000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff17b1eed0 a2=70 a3=0 items=0 ppid=4220 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.765000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.765000 audit: BPF prog-id=151 op=LOAD Feb 9 09:57:01.765000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff17b1edf0 a2=70 a3=ffffffff items=0 ppid=4220 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.765000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:57:01.766000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.766000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcd6082650 a2=70 a3=fff80800 items=0 ppid=4220 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.766000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:57:01.766000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:01.766000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcd6082520 a2=70 a3=3 items=0 ppid=4220 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.766000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:57:01.780000 audit: BPF prog-id=151 op=UNLOAD Feb 9 09:57:01.812000 audit[4440]: NETFILTER_CFG table=mangle:113 family=2 entries=19 op=nft_register_chain pid=4440 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:01.812000 audit[4440]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd000d5c30 a2=0 a3=7ffd000d5c1c items=0 ppid=4220 pid=4440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.812000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:01.820000 audit[4441]: NETFILTER_CFG table=nat:114 family=2 entries=16 op=nft_register_chain pid=4441 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:01.820000 audit[4441]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc4f275660 a2=0 a3=55e22aa04000 items=0 ppid=4220 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.820000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:01.820000 audit[4439]: NETFILTER_CFG table=raw:115 family=2 entries=19 op=nft_register_chain pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:01.820000 audit[4439]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffd54c8b820 a2=0 a3=559a717a7000 items=0 ppid=4220 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.820000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:01.823000 audit[4447]: NETFILTER_CFG table=filter:116 family=2 entries=39 op=nft_register_chain pid=4447 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:01.823000 audit[4447]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffda3088320 a2=0 a3=55f016f91000 items=0 ppid=4220 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:01.823000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:02.759847 systemd-networkd[1320]: vxlan.calico: Link UP Feb 9 09:57:02.759865 systemd-networkd[1320]: vxlan.calico: Gained carrier Feb 9 09:57:03.954903 systemd-networkd[1320]: vxlan.calico: Gained IPv6LL Feb 9 09:57:05.557462 env[1477]: time="2024-02-09T09:57:05.557350677Z" level=info msg="StopPodSandbox for \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\"" Feb 9 09:57:05.646600 env[1477]: 2024-02-09 09:57:05.623 [INFO][4490] k8s.go 578: Cleaning up netns ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:57:05.646600 env[1477]: 2024-02-09 09:57:05.623 [INFO][4490] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" iface="eth0" netns="/var/run/netns/cni-95cbffe3-ccd5-995f-32b7-0592cfc175a7" Feb 9 09:57:05.646600 env[1477]: 2024-02-09 09:57:05.623 [INFO][4490] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" iface="eth0" netns="/var/run/netns/cni-95cbffe3-ccd5-995f-32b7-0592cfc175a7" Feb 9 09:57:05.646600 env[1477]: 2024-02-09 09:57:05.623 [INFO][4490] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" iface="eth0" netns="/var/run/netns/cni-95cbffe3-ccd5-995f-32b7-0592cfc175a7" Feb 9 09:57:05.646600 env[1477]: 2024-02-09 09:57:05.623 [INFO][4490] k8s.go 585: Releasing IP address(es) ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:57:05.646600 env[1477]: 2024-02-09 09:57:05.623 [INFO][4490] utils.go 188: Calico CNI releasing IP address ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:57:05.646600 env[1477]: 2024-02-09 09:57:05.637 [INFO][4507] ipam_plugin.go 415: Releasing address using handleID ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" HandleID="k8s-pod-network.1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:05.646600 env[1477]: 2024-02-09 09:57:05.638 [INFO][4507] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:05.646600 env[1477]: 2024-02-09 09:57:05.638 [INFO][4507] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:05.646600 env[1477]: 2024-02-09 09:57:05.643 [WARNING][4507] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" HandleID="k8s-pod-network.1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:05.646600 env[1477]: 2024-02-09 09:57:05.643 [INFO][4507] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" HandleID="k8s-pod-network.1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:05.646600 env[1477]: 2024-02-09 09:57:05.644 [INFO][4507] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:05.646600 env[1477]: 2024-02-09 09:57:05.645 [INFO][4490] k8s.go 591: Teardown processing complete. ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:57:05.647272 env[1477]: time="2024-02-09T09:57:05.646672629Z" level=info msg="TearDown network for sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\" successfully" Feb 9 09:57:05.647272 env[1477]: time="2024-02-09T09:57:05.646699590Z" level=info msg="StopPodSandbox for \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\" returns successfully" Feb 9 09:57:05.647272 env[1477]: time="2024-02-09T09:57:05.647157787Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57dd9d46cc-hc6pw,Uid:86f8e619-cd35-46e0-b241-8ce4a323f389,Namespace:calico-system,Attempt:1,}" Feb 9 09:57:05.648560 systemd[1]: run-netns-cni\x2d95cbffe3\x2dccd5\x2d995f\x2d32b7\x2d0592cfc175a7.mount: Deactivated successfully. Feb 9 09:57:05.745204 systemd-networkd[1320]: cali73786ae905d: Link UP Feb 9 09:57:05.814239 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:57:05.814333 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali73786ae905d: link becomes ready Feb 9 09:57:05.814450 systemd-networkd[1320]: cali73786ae905d: Gained carrier Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.675 [INFO][4521] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0 calico-kube-controllers-57dd9d46cc- calico-system 86f8e619-cd35-46e0-b241-8ce4a323f389 753 0 2024-02-09 09:56:01 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:57dd9d46cc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-b0ed76e28d calico-kube-controllers-57dd9d46cc-hc6pw eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali73786ae905d [] []}} ContainerID="78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" Namespace="calico-system" Pod="calico-kube-controllers-57dd9d46cc-hc6pw" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-" Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.675 [INFO][4521] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" Namespace="calico-system" Pod="calico-kube-controllers-57dd9d46cc-hc6pw" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.694 [INFO][4545] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" HandleID="k8s-pod-network.78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.703 [INFO][4545] ipam_plugin.go 268: Auto assigning IP ContainerID="78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" HandleID="k8s-pod-network.78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000497990), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-b0ed76e28d", "pod":"calico-kube-controllers-57dd9d46cc-hc6pw", "timestamp":"2024-02-09 09:57:05.694758564 +0000 UTC"}, Hostname:"ci-3510.3.2-a-b0ed76e28d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.703 [INFO][4545] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.703 [INFO][4545] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.703 [INFO][4545] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-b0ed76e28d' Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.705 [INFO][4545] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.710 [INFO][4545] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.714 [INFO][4545] ipam.go 489: Trying affinity for 192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.716 [INFO][4545] ipam.go 155: Attempting to load block cidr=192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.719 [INFO][4545] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.719 [INFO][4545] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.46.128/26 handle="k8s-pod-network.78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.721 [INFO][4545] ipam.go 1682: Creating new handle: k8s-pod-network.78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912 Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.726 [INFO][4545] ipam.go 1203: Writing block in order to claim IPs block=192.168.46.128/26 handle="k8s-pod-network.78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.734 [INFO][4545] ipam.go 1216: Successfully claimed IPs: [192.168.46.129/26] block=192.168.46.128/26 handle="k8s-pod-network.78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.734 [INFO][4545] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.46.129/26] handle="k8s-pod-network.78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.734 [INFO][4545] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:05.820145 env[1477]: 2024-02-09 09:57:05.734 [INFO][4545] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.46.129/26] IPv6=[] ContainerID="78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" HandleID="k8s-pod-network.78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:05.820630 env[1477]: 2024-02-09 09:57:05.741 [INFO][4521] k8s.go 385: Populated endpoint ContainerID="78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" Namespace="calico-system" Pod="calico-kube-controllers-57dd9d46cc-hc6pw" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0", GenerateName:"calico-kube-controllers-57dd9d46cc-", Namespace:"calico-system", SelfLink:"", UID:"86f8e619-cd35-46e0-b241-8ce4a323f389", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57dd9d46cc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"", Pod:"calico-kube-controllers-57dd9d46cc-hc6pw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.46.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali73786ae905d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:05.820630 env[1477]: 2024-02-09 09:57:05.742 [INFO][4521] k8s.go 386: Calico CNI using IPs: [192.168.46.129/32] ContainerID="78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" Namespace="calico-system" Pod="calico-kube-controllers-57dd9d46cc-hc6pw" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:05.820630 env[1477]: 2024-02-09 09:57:05.742 [INFO][4521] dataplane_linux.go 68: Setting the host side veth name to cali73786ae905d ContainerID="78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" Namespace="calico-system" Pod="calico-kube-controllers-57dd9d46cc-hc6pw" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:05.820630 env[1477]: 2024-02-09 09:57:05.814 [INFO][4521] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" Namespace="calico-system" Pod="calico-kube-controllers-57dd9d46cc-hc6pw" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:05.820630 env[1477]: 2024-02-09 09:57:05.814 [INFO][4521] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" Namespace="calico-system" Pod="calico-kube-controllers-57dd9d46cc-hc6pw" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0", GenerateName:"calico-kube-controllers-57dd9d46cc-", Namespace:"calico-system", SelfLink:"", UID:"86f8e619-cd35-46e0-b241-8ce4a323f389", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57dd9d46cc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912", Pod:"calico-kube-controllers-57dd9d46cc-hc6pw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.46.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali73786ae905d", MAC:"de:69:68:91:13:b1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:05.820630 env[1477]: 2024-02-09 09:57:05.819 [INFO][4521] k8s.go 491: Wrote updated endpoint to datastore ContainerID="78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912" Namespace="calico-system" Pod="calico-kube-controllers-57dd9d46cc-hc6pw" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:05.826000 audit[4579]: NETFILTER_CFG table=filter:117 family=2 entries=36 op=nft_register_chain pid=4579 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:05.834113 env[1477]: time="2024-02-09T09:57:05.834032142Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:57:05.834113 env[1477]: time="2024-02-09T09:57:05.834052293Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:57:05.834113 env[1477]: time="2024-02-09T09:57:05.834059164Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:57:05.834233 env[1477]: time="2024-02-09T09:57:05.834115095Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912 pid=4587 runtime=io.containerd.runc.v2 Feb 9 09:57:05.852737 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 9 09:57:05.852786 kernel: audit: type=1325 audit(1707472625.826:1202): table=filter:117 family=2 entries=36 op=nft_register_chain pid=4579 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:05.868804 systemd[1]: Started cri-containerd-78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912.scope. Feb 9 09:57:05.826000 audit[4579]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc5154f500 a2=0 a3=7ffc5154f4ec items=0 ppid=4220 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:06.005631 kernel: audit: type=1300 audit(1707472625.826:1202): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc5154f500 a2=0 a3=7ffc5154f4ec items=0 ppid=4220 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:06.005706 kernel: audit: type=1327 audit(1707472625.826:1202): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:05.826000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:05.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.128330 kernel: audit: type=1400 audit(1707472625.917:1203): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.128419 kernel: audit: type=1400 audit(1707472625.917:1204): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:05.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:05.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.252743 kernel: audit: type=1400 audit(1707472625.917:1205): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.253578 kernel: audit: type=1400 audit(1707472625.917:1206): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.378207 kernel: audit: type=1400 audit(1707472625.917:1207): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.378281 kernel: audit: type=1400 audit(1707472625.917:1208): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.440999 kernel: audit: type=1400 audit(1707472625.917:1209): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:05.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.065000 audit: BPF prog-id=152 op=LOAD Feb 9 09:57:06.065000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.065000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4587 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:06.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623562656532353763303462326464343564386462386462316363 Feb 9 09:57:06.066000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.066000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4587 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:06.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623562656532353763303462326464343564386462386462316363 Feb 9 09:57:06.066000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.066000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.066000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.066000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.066000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.066000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.066000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.066000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.066000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.066000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.066000 audit: BPF prog-id=153 op=LOAD Feb 9 09:57:06.066000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00021ae70 items=0 ppid=4587 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:06.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623562656532353763303462326464343564386462386462316363 Feb 9 09:57:06.189000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.189000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.189000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.189000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.189000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.189000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.189000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.189000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.189000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.189000 audit: BPF prog-id=154 op=LOAD Feb 9 09:57:06.189000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00021aeb8 items=0 ppid=4587 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:06.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623562656532353763303462326464343564386462386462316363 Feb 9 09:57:06.313000 audit: BPF prog-id=154 op=UNLOAD Feb 9 09:57:06.313000 audit: BPF prog-id=153 op=UNLOAD Feb 9 09:57:06.313000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.313000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.313000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.313000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.313000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.313000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.313000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.313000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.313000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.313000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:06.313000 audit: BPF prog-id=155 op=LOAD Feb 9 09:57:06.313000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00021b2c8 items=0 ppid=4587 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:06.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623562656532353763303462326464343564386462386462316363 Feb 9 09:57:06.533055 env[1477]: time="2024-02-09T09:57:06.533027728Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57dd9d46cc-hc6pw,Uid:86f8e619-cd35-46e0-b241-8ce4a323f389,Namespace:calico-system,Attempt:1,} returns sandbox id \"78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912\"" Feb 9 09:57:06.533732 env[1477]: time="2024-02-09T09:57:06.533693150Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 09:57:06.963810 systemd-networkd[1320]: cali73786ae905d: Gained IPv6LL Feb 9 09:57:07.558313 env[1477]: time="2024-02-09T09:57:07.558169735Z" level=info msg="StopPodSandbox for \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\"" Feb 9 09:57:07.609497 env[1477]: 2024-02-09 09:57:07.592 [INFO][4642] k8s.go 578: Cleaning up netns ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:57:07.609497 env[1477]: 2024-02-09 09:57:07.592 [INFO][4642] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" iface="eth0" netns="/var/run/netns/cni-8b326562-d170-f702-d93f-7a9d88d07c70" Feb 9 09:57:07.609497 env[1477]: 2024-02-09 09:57:07.592 [INFO][4642] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" iface="eth0" netns="/var/run/netns/cni-8b326562-d170-f702-d93f-7a9d88d07c70" Feb 9 09:57:07.609497 env[1477]: 2024-02-09 09:57:07.592 [INFO][4642] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" iface="eth0" netns="/var/run/netns/cni-8b326562-d170-f702-d93f-7a9d88d07c70" Feb 9 09:57:07.609497 env[1477]: 2024-02-09 09:57:07.592 [INFO][4642] k8s.go 585: Releasing IP address(es) ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:57:07.609497 env[1477]: 2024-02-09 09:57:07.592 [INFO][4642] utils.go 188: Calico CNI releasing IP address ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:57:07.609497 env[1477]: 2024-02-09 09:57:07.602 [INFO][4657] ipam_plugin.go 415: Releasing address using handleID ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" HandleID="k8s-pod-network.3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:07.609497 env[1477]: 2024-02-09 09:57:07.602 [INFO][4657] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:07.609497 env[1477]: 2024-02-09 09:57:07.602 [INFO][4657] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:07.609497 env[1477]: 2024-02-09 09:57:07.606 [WARNING][4657] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" HandleID="k8s-pod-network.3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:07.609497 env[1477]: 2024-02-09 09:57:07.606 [INFO][4657] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" HandleID="k8s-pod-network.3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:07.609497 env[1477]: 2024-02-09 09:57:07.608 [INFO][4657] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:07.609497 env[1477]: 2024-02-09 09:57:07.608 [INFO][4642] k8s.go 591: Teardown processing complete. ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:57:07.609843 env[1477]: time="2024-02-09T09:57:07.609591373Z" level=info msg="TearDown network for sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\" successfully" Feb 9 09:57:07.609843 env[1477]: time="2024-02-09T09:57:07.609616888Z" level=info msg="StopPodSandbox for \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\" returns successfully" Feb 9 09:57:07.610054 env[1477]: time="2024-02-09T09:57:07.610038995Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hp56n,Uid:ff9f79f6-c361-4d6e-b829-523c638d7830,Namespace:calico-system,Attempt:1,}" Feb 9 09:57:07.611132 systemd[1]: run-netns-cni\x2d8b326562\x2dd170\x2df702\x2dd93f\x2d7a9d88d07c70.mount: Deactivated successfully. Feb 9 09:57:07.689969 systemd-networkd[1320]: cali86e2d97ca8c: Link UP Feb 9 09:57:07.751955 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:57:07.752001 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali86e2d97ca8c: link becomes ready Feb 9 09:57:07.752121 systemd-networkd[1320]: cali86e2d97ca8c: Gained carrier Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.633 [INFO][4672] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0 csi-node-driver- calico-system ff9f79f6-c361-4d6e-b829-523c638d7830 763 0 2024-02-09 09:56:01 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-b0ed76e28d csi-node-driver-hp56n eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali86e2d97ca8c [] []}} ContainerID="36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" Namespace="calico-system" Pod="csi-node-driver-hp56n" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-" Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.633 [INFO][4672] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" Namespace="calico-system" Pod="csi-node-driver-hp56n" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.652 [INFO][4692] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" HandleID="k8s-pod-network.36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.662 [INFO][4692] ipam_plugin.go 268: Auto assigning IP ContainerID="36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" HandleID="k8s-pod-network.36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000715340), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-b0ed76e28d", "pod":"csi-node-driver-hp56n", "timestamp":"2024-02-09 09:57:07.652771685 +0000 UTC"}, Hostname:"ci-3510.3.2-a-b0ed76e28d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.662 [INFO][4692] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.662 [INFO][4692] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.662 [INFO][4692] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-b0ed76e28d' Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.664 [INFO][4692] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.668 [INFO][4692] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.671 [INFO][4692] ipam.go 489: Trying affinity for 192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.673 [INFO][4692] ipam.go 155: Attempting to load block cidr=192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.675 [INFO][4692] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.675 [INFO][4692] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.46.128/26 handle="k8s-pod-network.36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.677 [INFO][4692] ipam.go 1682: Creating new handle: k8s-pod-network.36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1 Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.680 [INFO][4692] ipam.go 1203: Writing block in order to claim IPs block=192.168.46.128/26 handle="k8s-pod-network.36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.685 [INFO][4692] ipam.go 1216: Successfully claimed IPs: [192.168.46.130/26] block=192.168.46.128/26 handle="k8s-pod-network.36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.685 [INFO][4692] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.46.130/26] handle="k8s-pod-network.36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.685 [INFO][4692] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:07.757496 env[1477]: 2024-02-09 09:57:07.685 [INFO][4692] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.46.130/26] IPv6=[] ContainerID="36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" HandleID="k8s-pod-network.36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:07.757988 env[1477]: 2024-02-09 09:57:07.687 [INFO][4672] k8s.go 385: Populated endpoint ContainerID="36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" Namespace="calico-system" Pod="csi-node-driver-hp56n" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ff9f79f6-c361-4d6e-b829-523c638d7830", ResourceVersion:"763", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"", Pod:"csi-node-driver-hp56n", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.46.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali86e2d97ca8c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:07.757988 env[1477]: 2024-02-09 09:57:07.688 [INFO][4672] k8s.go 386: Calico CNI using IPs: [192.168.46.130/32] ContainerID="36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" Namespace="calico-system" Pod="csi-node-driver-hp56n" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:07.757988 env[1477]: 2024-02-09 09:57:07.688 [INFO][4672] dataplane_linux.go 68: Setting the host side veth name to cali86e2d97ca8c ContainerID="36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" Namespace="calico-system" Pod="csi-node-driver-hp56n" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:07.757988 env[1477]: 2024-02-09 09:57:07.752 [INFO][4672] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" Namespace="calico-system" Pod="csi-node-driver-hp56n" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:07.757988 env[1477]: 2024-02-09 09:57:07.752 [INFO][4672] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" Namespace="calico-system" Pod="csi-node-driver-hp56n" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ff9f79f6-c361-4d6e-b829-523c638d7830", ResourceVersion:"763", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1", Pod:"csi-node-driver-hp56n", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.46.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali86e2d97ca8c", MAC:"86:a1:d5:b7:40:89", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:07.757988 env[1477]: 2024-02-09 09:57:07.756 [INFO][4672] k8s.go 491: Wrote updated endpoint to datastore ContainerID="36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1" Namespace="calico-system" Pod="csi-node-driver-hp56n" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:07.762650 env[1477]: time="2024-02-09T09:57:07.762569396Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:57:07.762650 env[1477]: time="2024-02-09T09:57:07.762591343Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:57:07.762650 env[1477]: time="2024-02-09T09:57:07.762598435Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:57:07.762756 env[1477]: time="2024-02-09T09:57:07.762660635Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1 pid=4729 runtime=io.containerd.runc.v2 Feb 9 09:57:07.762000 audit[4735]: NETFILTER_CFG table=filter:118 family=2 entries=34 op=nft_register_chain pid=4735 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:07.762000 audit[4735]: SYSCALL arch=c000003e syscall=46 success=yes exit=18320 a0=3 a1=7ffda4430e70 a2=0 a3=7ffda4430e5c items=0 ppid=4220 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:07.762000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:07.781077 systemd[1]: Started cri-containerd-36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1.scope. Feb 9 09:57:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit: BPF prog-id=156 op=LOAD Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4729 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:07.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336643335373034653963653738666239313735353730336635653266 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=4729 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:07.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336643335373034653963653738666239313735353730336635653266 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit: BPF prog-id=157 op=LOAD Feb 9 09:57:07.784000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000218ae0 items=0 ppid=4729 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:07.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336643335373034653963653738666239313735353730336635653266 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit: BPF prog-id=158 op=LOAD Feb 9 09:57:07.784000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000218b28 items=0 ppid=4729 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:07.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336643335373034653963653738666239313735353730336635653266 Feb 9 09:57:07.784000 audit: BPF prog-id=158 op=UNLOAD Feb 9 09:57:07.784000 audit: BPF prog-id=157 op=UNLOAD Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:07.784000 audit: BPF prog-id=159 op=LOAD Feb 9 09:57:07.784000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000218f38 items=0 ppid=4729 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:07.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336643335373034653963653738666239313735353730336635653266 Feb 9 09:57:07.791672 env[1477]: time="2024-02-09T09:57:07.791648967Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hp56n,Uid:ff9f79f6-c361-4d6e-b829-523c638d7830,Namespace:calico-system,Attempt:1,} returns sandbox id \"36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1\"" Feb 9 09:57:08.558397 env[1477]: time="2024-02-09T09:57:08.558299854Z" level=info msg="StopPodSandbox for \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\"" Feb 9 09:57:08.612084 env[1477]: 2024-02-09 09:57:08.594 [INFO][4779] k8s.go 578: Cleaning up netns ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:57:08.612084 env[1477]: 2024-02-09 09:57:08.594 [INFO][4779] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" iface="eth0" netns="/var/run/netns/cni-4e4ab978-58bc-77b7-3f69-906249dde850" Feb 9 09:57:08.612084 env[1477]: 2024-02-09 09:57:08.594 [INFO][4779] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" iface="eth0" netns="/var/run/netns/cni-4e4ab978-58bc-77b7-3f69-906249dde850" Feb 9 09:57:08.612084 env[1477]: 2024-02-09 09:57:08.595 [INFO][4779] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" iface="eth0" netns="/var/run/netns/cni-4e4ab978-58bc-77b7-3f69-906249dde850" Feb 9 09:57:08.612084 env[1477]: 2024-02-09 09:57:08.595 [INFO][4779] k8s.go 585: Releasing IP address(es) ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:57:08.612084 env[1477]: 2024-02-09 09:57:08.595 [INFO][4779] utils.go 188: Calico CNI releasing IP address ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:57:08.612084 env[1477]: 2024-02-09 09:57:08.605 [INFO][4793] ipam_plugin.go 415: Releasing address using handleID ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" HandleID="k8s-pod-network.8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:08.612084 env[1477]: 2024-02-09 09:57:08.605 [INFO][4793] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:08.612084 env[1477]: 2024-02-09 09:57:08.605 [INFO][4793] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:08.612084 env[1477]: 2024-02-09 09:57:08.609 [WARNING][4793] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" HandleID="k8s-pod-network.8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:08.612084 env[1477]: 2024-02-09 09:57:08.609 [INFO][4793] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" HandleID="k8s-pod-network.8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:08.612084 env[1477]: 2024-02-09 09:57:08.610 [INFO][4793] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:08.612084 env[1477]: 2024-02-09 09:57:08.611 [INFO][4779] k8s.go 591: Teardown processing complete. ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:57:08.612464 env[1477]: time="2024-02-09T09:57:08.612123839Z" level=info msg="TearDown network for sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\" successfully" Feb 9 09:57:08.612464 env[1477]: time="2024-02-09T09:57:08.612144013Z" level=info msg="StopPodSandbox for \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\" returns successfully" Feb 9 09:57:08.612611 env[1477]: time="2024-02-09T09:57:08.612564086Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-n2txl,Uid:045ae4c6-7f62-4e3b-a026-fbc7ad050ea3,Namespace:kube-system,Attempt:1,}" Feb 9 09:57:08.614130 systemd[1]: run-netns-cni\x2d4e4ab978\x2d58bc\x2d77b7\x2d3f69\x2d906249dde850.mount: Deactivated successfully. Feb 9 09:57:08.670997 systemd-networkd[1320]: cali4aea9bb717c: Link UP Feb 9 09:57:08.698888 systemd-networkd[1320]: cali4aea9bb717c: Gained carrier Feb 9 09:57:08.699602 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4aea9bb717c: link becomes ready Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.633 [INFO][4809] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0 coredns-787d4945fb- kube-system 045ae4c6-7f62-4e3b-a026-fbc7ad050ea3 769 0 2024-02-09 09:55:56 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-b0ed76e28d coredns-787d4945fb-n2txl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4aea9bb717c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" Namespace="kube-system" Pod="coredns-787d4945fb-n2txl" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-" Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.633 [INFO][4809] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" Namespace="kube-system" Pod="coredns-787d4945fb-n2txl" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.647 [INFO][4832] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" HandleID="k8s-pod-network.525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.654 [INFO][4832] ipam_plugin.go 268: Auto assigning IP ContainerID="525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" HandleID="k8s-pod-network.525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00028f780), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-b0ed76e28d", "pod":"coredns-787d4945fb-n2txl", "timestamp":"2024-02-09 09:57:08.647897341 +0000 UTC"}, Hostname:"ci-3510.3.2-a-b0ed76e28d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.654 [INFO][4832] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.654 [INFO][4832] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.654 [INFO][4832] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-b0ed76e28d' Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.655 [INFO][4832] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.658 [INFO][4832] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.660 [INFO][4832] ipam.go 489: Trying affinity for 192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.661 [INFO][4832] ipam.go 155: Attempting to load block cidr=192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.663 [INFO][4832] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.663 [INFO][4832] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.46.128/26 handle="k8s-pod-network.525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.664 [INFO][4832] ipam.go 1682: Creating new handle: k8s-pod-network.525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.666 [INFO][4832] ipam.go 1203: Writing block in order to claim IPs block=192.168.46.128/26 handle="k8s-pod-network.525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.669 [INFO][4832] ipam.go 1216: Successfully claimed IPs: [192.168.46.131/26] block=192.168.46.128/26 handle="k8s-pod-network.525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.669 [INFO][4832] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.46.131/26] handle="k8s-pod-network.525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.669 [INFO][4832] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:08.703866 env[1477]: 2024-02-09 09:57:08.669 [INFO][4832] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.46.131/26] IPv6=[] ContainerID="525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" HandleID="k8s-pod-network.525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:08.704273 env[1477]: 2024-02-09 09:57:08.670 [INFO][4809] k8s.go 385: Populated endpoint ContainerID="525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" Namespace="kube-system" Pod="coredns-787d4945fb-n2txl" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"045ae4c6-7f62-4e3b-a026-fbc7ad050ea3", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 55, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"", Pod:"coredns-787d4945fb-n2txl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4aea9bb717c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:08.704273 env[1477]: 2024-02-09 09:57:08.670 [INFO][4809] k8s.go 386: Calico CNI using IPs: [192.168.46.131/32] ContainerID="525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" Namespace="kube-system" Pod="coredns-787d4945fb-n2txl" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:08.704273 env[1477]: 2024-02-09 09:57:08.670 [INFO][4809] dataplane_linux.go 68: Setting the host side veth name to cali4aea9bb717c ContainerID="525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" Namespace="kube-system" Pod="coredns-787d4945fb-n2txl" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:08.704273 env[1477]: 2024-02-09 09:57:08.698 [INFO][4809] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" Namespace="kube-system" Pod="coredns-787d4945fb-n2txl" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:08.704273 env[1477]: 2024-02-09 09:57:08.698 [INFO][4809] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" Namespace="kube-system" Pod="coredns-787d4945fb-n2txl" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"045ae4c6-7f62-4e3b-a026-fbc7ad050ea3", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 55, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb", Pod:"coredns-787d4945fb-n2txl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4aea9bb717c", MAC:"4a:37:41:94:da:0a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:08.704273 env[1477]: 2024-02-09 09:57:08.703 [INFO][4809] k8s.go 491: Wrote updated endpoint to datastore ContainerID="525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb" Namespace="kube-system" Pod="coredns-787d4945fb-n2txl" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:08.709242 env[1477]: time="2024-02-09T09:57:08.709206180Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:57:08.709242 env[1477]: time="2024-02-09T09:57:08.709228351Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:57:08.709242 env[1477]: time="2024-02-09T09:57:08.709235336Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:57:08.709372 env[1477]: time="2024-02-09T09:57:08.709292449Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb pid=4870 runtime=io.containerd.runc.v2 Feb 9 09:57:08.710000 audit[4879]: NETFILTER_CFG table=filter:119 family=2 entries=44 op=nft_register_chain pid=4879 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:08.710000 audit[4879]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffffe931f50 a2=0 a3=7ffffe931f3c items=0 ppid=4220 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:08.710000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:08.727924 systemd[1]: Started cri-containerd-525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb.scope. Feb 9 09:57:08.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit: BPF prog-id=160 op=LOAD Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4870 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532356632623830393662643364663062306266663637343038656233 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=4870 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532356632623830393662643364663062306266663637343038656233 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit: BPF prog-id=161 op=LOAD Feb 9 09:57:08.733000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c00028ae50 items=0 ppid=4870 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532356632623830393662643364663062306266663637343038656233 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit: BPF prog-id=162 op=LOAD Feb 9 09:57:08.733000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c00028ae98 items=0 ppid=4870 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532356632623830393662643364663062306266663637343038656233 Feb 9 09:57:08.733000 audit: BPF prog-id=162 op=UNLOAD Feb 9 09:57:08.733000 audit: BPF prog-id=161 op=UNLOAD Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.733000 audit: BPF prog-id=163 op=LOAD Feb 9 09:57:08.733000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c00028b2a8 items=0 ppid=4870 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532356632623830393662643364663062306266663637343038656233 Feb 9 09:57:08.762122 env[1477]: time="2024-02-09T09:57:08.762094492Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-n2txl,Uid:045ae4c6-7f62-4e3b-a026-fbc7ad050ea3,Namespace:kube-system,Attempt:1,} returns sandbox id \"525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb\"" Feb 9 09:57:08.763219 env[1477]: time="2024-02-09T09:57:08.763202613Z" level=info msg="CreateContainer within sandbox \"525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 09:57:08.769915 env[1477]: time="2024-02-09T09:57:08.769897047Z" level=info msg="CreateContainer within sandbox \"525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"51c3fe872325c1b12ed8277ef57b5900acb519e056c9f736135aa0db651f4040\"" Feb 9 09:57:08.770091 env[1477]: time="2024-02-09T09:57:08.770076570Z" level=info msg="StartContainer for \"51c3fe872325c1b12ed8277ef57b5900acb519e056c9f736135aa0db651f4040\"" Feb 9 09:57:08.791090 systemd[1]: Started cri-containerd-51c3fe872325c1b12ed8277ef57b5900acb519e056c9f736135aa0db651f4040.scope. Feb 9 09:57:08.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit: BPF prog-id=164 op=LOAD Feb 9 09:57:08.800000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4870 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:08.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531633366653837323332356331623132656438323737656635376235 Feb 9 09:57:08.800000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4870 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:08.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531633366653837323332356331623132656438323737656635376235 Feb 9 09:57:08.800000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.800000 audit: BPF prog-id=165 op=LOAD Feb 9 09:57:08.800000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003b6120 items=0 ppid=4870 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:08.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531633366653837323332356331623132656438323737656635376235 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit: BPF prog-id=166 op=LOAD Feb 9 09:57:08.801000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003b6168 items=0 ppid=4870 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:08.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531633366653837323332356331623132656438323737656635376235 Feb 9 09:57:08.801000 audit: BPF prog-id=166 op=UNLOAD Feb 9 09:57:08.801000 audit: BPF prog-id=165 op=UNLOAD Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:08.801000 audit: BPF prog-id=167 op=LOAD Feb 9 09:57:08.801000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b6578 items=0 ppid=4870 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:08.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531633366653837323332356331623132656438323737656635376235 Feb 9 09:57:08.828143 env[1477]: time="2024-02-09T09:57:08.827926892Z" level=info msg="StartContainer for \"51c3fe872325c1b12ed8277ef57b5900acb519e056c9f736135aa0db651f4040\" returns successfully" Feb 9 09:57:09.558596 env[1477]: time="2024-02-09T09:57:09.558491109Z" level=info msg="StopPodSandbox for \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\"" Feb 9 09:57:09.587747 systemd-networkd[1320]: cali86e2d97ca8c: Gained IPv6LL Feb 9 09:57:09.613280 env[1477]: 2024-02-09 09:57:09.595 [INFO][4970] k8s.go 578: Cleaning up netns ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:57:09.613280 env[1477]: 2024-02-09 09:57:09.595 [INFO][4970] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" iface="eth0" netns="/var/run/netns/cni-d8f92818-b0f9-13b2-c011-33efc59ea936" Feb 9 09:57:09.613280 env[1477]: 2024-02-09 09:57:09.595 [INFO][4970] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" iface="eth0" netns="/var/run/netns/cni-d8f92818-b0f9-13b2-c011-33efc59ea936" Feb 9 09:57:09.613280 env[1477]: 2024-02-09 09:57:09.595 [INFO][4970] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" iface="eth0" netns="/var/run/netns/cni-d8f92818-b0f9-13b2-c011-33efc59ea936" Feb 9 09:57:09.613280 env[1477]: 2024-02-09 09:57:09.595 [INFO][4970] k8s.go 585: Releasing IP address(es) ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:57:09.613280 env[1477]: 2024-02-09 09:57:09.595 [INFO][4970] utils.go 188: Calico CNI releasing IP address ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:57:09.613280 env[1477]: 2024-02-09 09:57:09.605 [INFO][4986] ipam_plugin.go 415: Releasing address using handleID ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" HandleID="k8s-pod-network.5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:09.613280 env[1477]: 2024-02-09 09:57:09.605 [INFO][4986] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:09.613280 env[1477]: 2024-02-09 09:57:09.605 [INFO][4986] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:09.613280 env[1477]: 2024-02-09 09:57:09.610 [WARNING][4986] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" HandleID="k8s-pod-network.5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:09.613280 env[1477]: 2024-02-09 09:57:09.610 [INFO][4986] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" HandleID="k8s-pod-network.5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:09.613280 env[1477]: 2024-02-09 09:57:09.611 [INFO][4986] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:09.613280 env[1477]: 2024-02-09 09:57:09.612 [INFO][4970] k8s.go 591: Teardown processing complete. ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:57:09.613666 env[1477]: time="2024-02-09T09:57:09.613323414Z" level=info msg="TearDown network for sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\" successfully" Feb 9 09:57:09.613666 env[1477]: time="2024-02-09T09:57:09.613351633Z" level=info msg="StopPodSandbox for \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\" returns successfully" Feb 9 09:57:09.613797 env[1477]: time="2024-02-09T09:57:09.613780705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-d5lzv,Uid:ee9dcfdb-fb61-4be4-9821-f2da6b546baa,Namespace:kube-system,Attempt:1,}" Feb 9 09:57:09.615759 systemd[1]: run-netns-cni\x2dd8f92818\x2db0f9\x2d13b2\x2dc011\x2d33efc59ea936.mount: Deactivated successfully. Feb 9 09:57:09.684055 systemd-networkd[1320]: cali69962a0140c: Link UP Feb 9 09:57:09.737615 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:57:09.737654 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali69962a0140c: link becomes ready Feb 9 09:57:09.737674 systemd-networkd[1320]: cali69962a0140c: Gained carrier Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.637 [INFO][5003] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0 coredns-787d4945fb- kube-system ee9dcfdb-fb61-4be4-9821-f2da6b546baa 780 0 2024-02-09 09:55:56 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-b0ed76e28d coredns-787d4945fb-d5lzv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali69962a0140c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" Namespace="kube-system" Pod="coredns-787d4945fb-d5lzv" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-" Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.637 [INFO][5003] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" Namespace="kube-system" Pod="coredns-787d4945fb-d5lzv" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.653 [INFO][5023] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" HandleID="k8s-pod-network.654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.662 [INFO][5023] ipam_plugin.go 268: Auto assigning IP ContainerID="654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" HandleID="k8s-pod-network.654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000519d0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-b0ed76e28d", "pod":"coredns-787d4945fb-d5lzv", "timestamp":"2024-02-09 09:57:09.653813373 +0000 UTC"}, Hostname:"ci-3510.3.2-a-b0ed76e28d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.662 [INFO][5023] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.662 [INFO][5023] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.662 [INFO][5023] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-b0ed76e28d' Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.663 [INFO][5023] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.667 [INFO][5023] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.670 [INFO][5023] ipam.go 489: Trying affinity for 192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.671 [INFO][5023] ipam.go 155: Attempting to load block cidr=192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.673 [INFO][5023] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.673 [INFO][5023] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.46.128/26 handle="k8s-pod-network.654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.674 [INFO][5023] ipam.go 1682: Creating new handle: k8s-pod-network.654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3 Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.677 [INFO][5023] ipam.go 1203: Writing block in order to claim IPs block=192.168.46.128/26 handle="k8s-pod-network.654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.681 [INFO][5023] ipam.go 1216: Successfully claimed IPs: [192.168.46.132/26] block=192.168.46.128/26 handle="k8s-pod-network.654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.681 [INFO][5023] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.46.132/26] handle="k8s-pod-network.654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.681 [INFO][5023] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:09.742895 env[1477]: 2024-02-09 09:57:09.681 [INFO][5023] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.46.132/26] IPv6=[] ContainerID="654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" HandleID="k8s-pod-network.654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:09.743459 env[1477]: 2024-02-09 09:57:09.682 [INFO][5003] k8s.go 385: Populated endpoint ContainerID="654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" Namespace="kube-system" Pod="coredns-787d4945fb-d5lzv" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"ee9dcfdb-fb61-4be4-9821-f2da6b546baa", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 55, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"", Pod:"coredns-787d4945fb-d5lzv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali69962a0140c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:09.743459 env[1477]: 2024-02-09 09:57:09.682 [INFO][5003] k8s.go 386: Calico CNI using IPs: [192.168.46.132/32] ContainerID="654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" Namespace="kube-system" Pod="coredns-787d4945fb-d5lzv" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:09.743459 env[1477]: 2024-02-09 09:57:09.682 [INFO][5003] dataplane_linux.go 68: Setting the host side veth name to cali69962a0140c ContainerID="654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" Namespace="kube-system" Pod="coredns-787d4945fb-d5lzv" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:09.743459 env[1477]: 2024-02-09 09:57:09.737 [INFO][5003] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" Namespace="kube-system" Pod="coredns-787d4945fb-d5lzv" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:09.743459 env[1477]: 2024-02-09 09:57:09.737 [INFO][5003] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" Namespace="kube-system" Pod="coredns-787d4945fb-d5lzv" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"ee9dcfdb-fb61-4be4-9821-f2da6b546baa", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 55, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3", Pod:"coredns-787d4945fb-d5lzv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali69962a0140c", MAC:"2a:f6:a8:49:4e:41", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:09.743459 env[1477]: 2024-02-09 09:57:09.742 [INFO][5003] k8s.go 491: Wrote updated endpoint to datastore ContainerID="654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3" Namespace="kube-system" Pod="coredns-787d4945fb-d5lzv" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:09.748134 env[1477]: time="2024-02-09T09:57:09.748102030Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:57:09.748134 env[1477]: time="2024-02-09T09:57:09.748122695Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:57:09.748134 env[1477]: time="2024-02-09T09:57:09.748129625Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:57:09.748261 env[1477]: time="2024-02-09T09:57:09.748194822Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3 pid=5059 runtime=io.containerd.runc.v2 Feb 9 09:57:09.747000 audit[5064]: NETFILTER_CFG table=filter:120 family=2 entries=38 op=nft_register_chain pid=5064 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:09.747000 audit[5064]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffc42fb8900 a2=0 a3=7ffc42fb88ec items=0 ppid=4220 pid=5064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.747000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:09.778358 systemd[1]: Started cri-containerd-654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3.scope. Feb 9 09:57:09.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.802000 audit: BPF prog-id=168 op=LOAD Feb 9 09:57:09.803000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.803000 audit[5069]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=5059 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346465656637303030643834393236613933643965333733393633 Feb 9 09:57:09.803000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.803000 audit[5069]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=5059 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346465656637303030643834393236613933643965333733393633 Feb 9 09:57:09.803000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.803000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.803000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.803000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.803000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.803000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.803000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.803000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.803000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.803000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.803000 audit: BPF prog-id=169 op=LOAD Feb 9 09:57:09.803000 audit[5069]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c0002128d0 items=0 ppid=5059 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346465656637303030643834393236613933643965333733393633 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit: BPF prog-id=170 op=LOAD Feb 9 09:57:09.804000 audit[5069]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c000212918 items=0 ppid=5059 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346465656637303030643834393236613933643965333733393633 Feb 9 09:57:09.804000 audit: BPF prog-id=170 op=UNLOAD Feb 9 09:57:09.804000 audit: BPF prog-id=169 op=UNLOAD Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.804000 audit: BPF prog-id=171 op=LOAD Feb 9 09:57:09.804000 audit[5069]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c000212d28 items=0 ppid=5059 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346465656637303030643834393236613933643965333733393633 Feb 9 09:57:09.833614 kubelet[2599]: I0209 09:57:09.833585 2599 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-n2txl" podStartSLOduration=73.833543745 pod.CreationTimestamp="2024-02-09 09:55:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:57:09.833106856 +0000 UTC m=+87.343444042" watchObservedRunningTime="2024-02-09 09:57:09.833543745 +0000 UTC m=+87.343880924" Feb 9 09:57:09.860584 env[1477]: time="2024-02-09T09:57:09.860551371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-d5lzv,Uid:ee9dcfdb-fb61-4be4-9821-f2da6b546baa,Namespace:kube-system,Attempt:1,} returns sandbox id \"654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3\"" Feb 9 09:57:09.859000 audit[5118]: NETFILTER_CFG table=filter:121 family=2 entries=12 op=nft_register_rule pid=5118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:09.859000 audit[5118]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd9a4a7230 a2=0 a3=7ffd9a4a721c items=0 ppid=2893 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.859000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:09.861874 env[1477]: time="2024-02-09T09:57:09.861843659Z" level=info msg="CreateContainer within sandbox \"654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 09:57:09.865975 env[1477]: time="2024-02-09T09:57:09.865930694Z" level=info msg="CreateContainer within sandbox \"654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ab8fcf5340d502265daaaa1bef94d3aa7de50f8dbee89d2a7cb212b9b5fed865\"" Feb 9 09:57:09.866193 env[1477]: time="2024-02-09T09:57:09.866130974Z" level=info msg="StartContainer for \"ab8fcf5340d502265daaaa1bef94d3aa7de50f8dbee89d2a7cb212b9b5fed865\"" Feb 9 09:57:09.860000 audit[5118]: NETFILTER_CFG table=nat:122 family=2 entries=30 op=nft_register_rule pid=5118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:09.860000 audit[5118]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffd9a4a7230 a2=0 a3=7ffd9a4a721c items=0 ppid=2893 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:09.874113 systemd[1]: Started cri-containerd-ab8fcf5340d502265daaaa1bef94d3aa7de50f8dbee89d2a7cb212b9b5fed865.scope. Feb 9 09:57:09.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit: BPF prog-id=172 op=LOAD Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5059 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386663663533343064353032323635646161616131626566393464 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5059 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386663663533343064353032323635646161616131626566393464 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit: BPF prog-id=173 op=LOAD Feb 9 09:57:09.879000 audit[5126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c2120 items=0 ppid=5059 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386663663533343064353032323635646161616131626566393464 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit: BPF prog-id=174 op=LOAD Feb 9 09:57:09.879000 audit[5126]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c2168 items=0 ppid=5059 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386663663533343064353032323635646161616131626566393464 Feb 9 09:57:09.879000 audit: BPF prog-id=174 op=UNLOAD Feb 9 09:57:09.879000 audit: BPF prog-id=173 op=UNLOAD Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:09.879000 audit: BPF prog-id=175 op=LOAD Feb 9 09:57:09.879000 audit[5126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c2578 items=0 ppid=5059 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386663663533343064353032323635646161616131626566393464 Feb 9 09:57:09.892000 audit[5174]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=5174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:09.892000 audit[5174]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd3687db70 a2=0 a3=7ffd3687db5c items=0 ppid=2893 pid=5174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:09.900599 env[1477]: time="2024-02-09T09:57:09.900569690Z" level=info msg="StartContainer for \"ab8fcf5340d502265daaaa1bef94d3aa7de50f8dbee89d2a7cb212b9b5fed865\" returns successfully" Feb 9 09:57:09.893000 audit[5174]: NETFILTER_CFG table=nat:124 family=2 entries=51 op=nft_register_chain pid=5174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:09.893000 audit[5174]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffd3687db70 a2=0 a3=7ffd3687db5c items=0 ppid=2893 pid=5174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:09.893000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:10.738790 systemd-networkd[1320]: cali4aea9bb717c: Gained IPv6LL Feb 9 09:57:10.843666 kubelet[2599]: I0209 09:57:10.843647 2599 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-d5lzv" podStartSLOduration=74.843624475 pod.CreationTimestamp="2024-02-09 09:55:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:57:10.843163339 +0000 UTC m=+88.353500499" watchObservedRunningTime="2024-02-09 09:57:10.843624475 +0000 UTC m=+88.353961632" Feb 9 09:57:10.866000 audit[5221]: NETFILTER_CFG table=filter:125 family=2 entries=6 op=nft_register_rule pid=5221 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:10.892962 kernel: kauditd_printk_skb: 356 callbacks suppressed Feb 9 09:57:10.893018 kernel: audit: type=1325 audit(1707472630.866:1318): table=filter:125 family=2 entries=6 op=nft_register_rule pid=5221 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:10.866000 audit[5221]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe6f483760 a2=0 a3=7ffe6f48374c items=0 ppid=2893 pid=5221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:11.041307 kernel: audit: type=1300 audit(1707472630.866:1318): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe6f483760 a2=0 a3=7ffe6f48374c items=0 ppid=2893 pid=5221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:11.041343 kernel: audit: type=1327 audit(1707472630.866:1318): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:10.866000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:10.867000 audit[5221]: NETFILTER_CFG table=nat:126 family=2 entries=60 op=nft_register_rule pid=5221 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:10.867000 audit[5221]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffe6f483760 a2=0 a3=7ffe6f48374c items=0 ppid=2893 pid=5221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:11.186704 systemd-networkd[1320]: cali69962a0140c: Gained IPv6LL Feb 9 09:57:11.244896 kernel: audit: type=1325 audit(1707472630.867:1319): table=nat:126 family=2 entries=60 op=nft_register_rule pid=5221 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:11.244937 kernel: audit: type=1300 audit(1707472630.867:1319): arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffe6f483760 a2=0 a3=7ffe6f48374c items=0 ppid=2893 pid=5221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:11.244956 kernel: audit: type=1327 audit(1707472630.867:1319): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:10.867000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:11.866000 audit[5254]: NETFILTER_CFG table=filter:127 family=2 entries=6 op=nft_register_rule pid=5254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:11.866000 audit[5254]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc65cdb810 a2=0 a3=7ffc65cdb7fc items=0 ppid=2893 pid=5254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:12.016101 kernel: audit: type=1325 audit(1707472631.866:1320): table=filter:127 family=2 entries=6 op=nft_register_rule pid=5254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:12.016133 kernel: audit: type=1300 audit(1707472631.866:1320): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc65cdb810 a2=0 a3=7ffc65cdb7fc items=0 ppid=2893 pid=5254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:11.866000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:12.072383 kernel: audit: type=1327 audit(1707472631.866:1320): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:12.072000 audit[5254]: NETFILTER_CFG table=nat:128 family=2 entries=72 op=nft_register_chain pid=5254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:12.072000 audit[5254]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc65cdb810 a2=0 a3=7ffc65cdb7fc items=0 ppid=2893 pid=5254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:12.072000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:12.130639 kernel: audit: type=1325 audit(1707472632.072:1321): table=nat:128 family=2 entries=72 op=nft_register_chain pid=5254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:16.659011 env[1477]: time="2024-02-09T09:57:16.658985317Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:16.660010 env[1477]: time="2024-02-09T09:57:16.659967480Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:16.660999 env[1477]: time="2024-02-09T09:57:16.660955112Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:16.661989 env[1477]: time="2024-02-09T09:57:16.661948448Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:16.662893 env[1477]: time="2024-02-09T09:57:16.662850808Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 09:57:16.663236 env[1477]: time="2024-02-09T09:57:16.663182297Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 09:57:16.666880 env[1477]: time="2024-02-09T09:57:16.666842225Z" level=info msg="CreateContainer within sandbox \"78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 09:57:16.671894 env[1477]: time="2024-02-09T09:57:16.671851717Z" level=info msg="CreateContainer within sandbox \"78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"60ef42ee1acd19975a4e6f132b2d43d656d1e2850b9473cf30335f75b9dd51ee\"" Feb 9 09:57:16.672277 env[1477]: time="2024-02-09T09:57:16.672259608Z" level=info msg="StartContainer for \"60ef42ee1acd19975a4e6f132b2d43d656d1e2850b9473cf30335f75b9dd51ee\"" Feb 9 09:57:16.694037 systemd[1]: Started cri-containerd-60ef42ee1acd19975a4e6f132b2d43d656d1e2850b9473cf30335f75b9dd51ee.scope. Feb 9 09:57:16.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.726966 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 09:57:16.727069 kernel: audit: type=1400 audit(1707472636.700:1322): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848563 kernel: audit: type=1400 audit(1707472636.700:1323): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848598 kernel: audit: type=1400 audit(1707472636.700:1324): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.970457 kernel: audit: type=1400 audit(1707472636.700:1325): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.970493 kernel: audit: type=1400 audit(1707472636.700:1326): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.031557 kernel: audit: type=1400 audit(1707472636.700:1327): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.092677 kernel: audit: type=1400 audit(1707472636.700:1328): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.214918 kernel: audit: type=1400 audit(1707472636.700:1329): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.214952 kernel: audit: type=1400 audit(1707472636.700:1330): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.337638 kernel: audit: type=1400 audit(1707472636.847:1331): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.847000 audit: BPF prog-id=176 op=LOAD Feb 9 09:57:16.848000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848000 audit[5292]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4587 pid=5292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:16.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630656634326565316163643139393735613465366631333262326434 Feb 9 09:57:16.848000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848000 audit[5292]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=4587 pid=5292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:16.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630656634326565316163643139393735613465366631333262326434 Feb 9 09:57:16.848000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.848000 audit: BPF prog-id=177 op=LOAD Feb 9 09:57:16.848000 audit[5292]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0001e5ce0 items=0 ppid=4587 pid=5292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:16.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630656634326565316163643139393735613465366631333262326434 Feb 9 09:57:16.969000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.969000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.969000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.969000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.969000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.969000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.969000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.969000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.969000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:16.969000 audit: BPF prog-id=178 op=LOAD Feb 9 09:57:16.969000 audit[5292]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0001e5d28 items=0 ppid=4587 pid=5292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:16.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630656634326565316163643139393735613465366631333262326434 Feb 9 09:57:17.092000 audit: BPF prog-id=178 op=UNLOAD Feb 9 09:57:17.092000 audit: BPF prog-id=177 op=UNLOAD Feb 9 09:57:17.092000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.092000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.092000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.092000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.092000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.092000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.092000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.092000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.092000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.092000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.092000 audit: BPF prog-id=179 op=LOAD Feb 9 09:57:17.092000 audit[5292]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000426138 items=0 ppid=4587 pid=5292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:17.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630656634326565316163643139393735613465366631333262326434 Feb 9 09:57:17.367605 env[1477]: time="2024-02-09T09:57:17.367581918Z" level=info msg="StartContainer for \"60ef42ee1acd19975a4e6f132b2d43d656d1e2850b9473cf30335f75b9dd51ee\" returns successfully" Feb 9 09:57:17.931016 kubelet[2599]: I0209 09:57:17.930990 2599 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-57dd9d46cc-hc6pw" podStartSLOduration=-9.223371959923822e+09 pod.CreationTimestamp="2024-02-09 09:56:01 +0000 UTC" firstStartedPulling="2024-02-09 09:57:06.533564772 +0000 UTC m=+84.043901929" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:57:17.873088007 +0000 UTC m=+95.383425248" watchObservedRunningTime="2024-02-09 09:57:17.930953729 +0000 UTC m=+95.441290895" Feb 9 09:57:21.362197 kubelet[2599]: I0209 09:57:21.362159 2599 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:57:21.367203 kubelet[2599]: I0209 09:57:21.367142 2599 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:57:21.368077 systemd[1]: Created slice kubepods-besteffort-pod77036e09_d69b_4aa3_9791_651700d1c287.slice. Feb 9 09:57:21.371990 systemd[1]: Created slice kubepods-besteffort-pod7f3f0367_3295_467e_8146_009219c60557.slice. Feb 9 09:57:21.382000 audit[5375]: NETFILTER_CFG table=filter:129 family=2 entries=7 op=nft_register_rule pid=5375 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:21.382000 audit[5375]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe56295000 a2=0 a3=7ffe56294fec items=0 ppid=2893 pid=5375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:21.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:21.383000 audit[5375]: NETFILTER_CFG table=nat:130 family=2 entries=78 op=nft_register_rule pid=5375 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:21.383000 audit[5375]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe56295000 a2=0 a3=7ffe56294fec items=0 ppid=2893 pid=5375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:21.383000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:21.416000 audit[5401]: NETFILTER_CFG table=filter:131 family=2 entries=8 op=nft_register_rule pid=5401 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:21.416000 audit[5401]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffeb2b77d10 a2=0 a3=7ffeb2b77cfc items=0 ppid=2893 pid=5401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:21.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:21.417000 audit[5401]: NETFILTER_CFG table=nat:132 family=2 entries=78 op=nft_register_rule pid=5401 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:21.417000 audit[5401]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffeb2b77d10 a2=0 a3=7ffeb2b77cfc items=0 ppid=2893 pid=5401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:21.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:21.546899 kubelet[2599]: I0209 09:57:21.546829 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5kfsz\" (UniqueName: \"kubernetes.io/projected/77036e09-d69b-4aa3-9791-651700d1c287-kube-api-access-5kfsz\") pod \"calico-apiserver-9c5489b7f-h8556\" (UID: \"77036e09-d69b-4aa3-9791-651700d1c287\") " pod="calico-apiserver/calico-apiserver-9c5489b7f-h8556" Feb 9 09:57:21.547184 kubelet[2599]: I0209 09:57:21.546939 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/77036e09-d69b-4aa3-9791-651700d1c287-calico-apiserver-certs\") pod \"calico-apiserver-9c5489b7f-h8556\" (UID: \"77036e09-d69b-4aa3-9791-651700d1c287\") " pod="calico-apiserver/calico-apiserver-9c5489b7f-h8556" Feb 9 09:57:21.547312 kubelet[2599]: I0209 09:57:21.547229 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7f3f0367-3295-467e-8146-009219c60557-calico-apiserver-certs\") pod \"calico-apiserver-9c5489b7f-q48tn\" (UID: \"7f3f0367-3295-467e-8146-009219c60557\") " pod="calico-apiserver/calico-apiserver-9c5489b7f-q48tn" Feb 9 09:57:21.547425 kubelet[2599]: I0209 09:57:21.547332 2599 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dz7n6\" (UniqueName: \"kubernetes.io/projected/7f3f0367-3295-467e-8146-009219c60557-kube-api-access-dz7n6\") pod \"calico-apiserver-9c5489b7f-q48tn\" (UID: \"7f3f0367-3295-467e-8146-009219c60557\") " pod="calico-apiserver/calico-apiserver-9c5489b7f-q48tn" Feb 9 09:57:21.648491 kubelet[2599]: E0209 09:57:21.648272 2599 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 09:57:21.648491 kubelet[2599]: E0209 09:57:21.648299 2599 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 09:57:21.648491 kubelet[2599]: E0209 09:57:21.648458 2599 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/77036e09-d69b-4aa3-9791-651700d1c287-calico-apiserver-certs podName:77036e09-d69b-4aa3-9791-651700d1c287 nodeName:}" failed. No retries permitted until 2024-02-09 09:57:22.148407842 +0000 UTC m=+99.658745051 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/77036e09-d69b-4aa3-9791-651700d1c287-calico-apiserver-certs") pod "calico-apiserver-9c5489b7f-h8556" (UID: "77036e09-d69b-4aa3-9791-651700d1c287") : secret "calico-apiserver-certs" not found Feb 9 09:57:21.649223 kubelet[2599]: E0209 09:57:21.648509 2599 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/7f3f0367-3295-467e-8146-009219c60557-calico-apiserver-certs podName:7f3f0367-3295-467e-8146-009219c60557 nodeName:}" failed. No retries permitted until 2024-02-09 09:57:22.148482728 +0000 UTC m=+99.658819937 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/7f3f0367-3295-467e-8146-009219c60557-calico-apiserver-certs") pod "calico-apiserver-9c5489b7f-q48tn" (UID: "7f3f0367-3295-467e-8146-009219c60557") : secret "calico-apiserver-certs" not found Feb 9 09:57:22.271721 env[1477]: time="2024-02-09T09:57:22.271589741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9c5489b7f-h8556,Uid:77036e09-d69b-4aa3-9791-651700d1c287,Namespace:calico-apiserver,Attempt:0,}" Feb 9 09:57:22.274839 env[1477]: time="2024-02-09T09:57:22.274728036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9c5489b7f-q48tn,Uid:7f3f0367-3295-467e-8146-009219c60557,Namespace:calico-apiserver,Attempt:0,}" Feb 9 09:57:22.406273 systemd-networkd[1320]: calia7f82154a99: Link UP Feb 9 09:57:22.462466 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:57:22.462539 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia7f82154a99: link becomes ready Feb 9 09:57:22.462579 systemd-networkd[1320]: calia7f82154a99: Gained carrier Feb 9 09:57:22.463099 systemd-networkd[1320]: cali97cbb35b541: Link UP Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.337 [INFO][5413] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-eth0 calico-apiserver-9c5489b7f- calico-apiserver 77036e09-d69b-4aa3-9791-651700d1c287 886 0 2024-02-09 09:57:21 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:9c5489b7f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-b0ed76e28d calico-apiserver-9c5489b7f-h8556 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia7f82154a99 [] []}} ContainerID="ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-h8556" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-" Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.337 [INFO][5413] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-h8556" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-eth0" Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.365 [INFO][5458] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" HandleID="k8s-pod-network.ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-eth0" Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.376 [INFO][5458] ipam_plugin.go 268: Auto assigning IP ContainerID="ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" HandleID="k8s-pod-network.ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010dbc0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-b0ed76e28d", "pod":"calico-apiserver-9c5489b7f-h8556", "timestamp":"2024-02-09 09:57:22.365033123 +0000 UTC"}, Hostname:"ci-3510.3.2-a-b0ed76e28d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.376 [INFO][5458] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.376 [INFO][5458] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.376 [INFO][5458] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-b0ed76e28d' Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.378 [INFO][5458] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.382 [INFO][5458] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.387 [INFO][5458] ipam.go 489: Trying affinity for 192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.389 [INFO][5458] ipam.go 155: Attempting to load block cidr=192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.391 [INFO][5458] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.391 [INFO][5458] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.46.128/26 handle="k8s-pod-network.ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.393 [INFO][5458] ipam.go 1682: Creating new handle: k8s-pod-network.ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.397 [INFO][5458] ipam.go 1203: Writing block in order to claim IPs block=192.168.46.128/26 handle="k8s-pod-network.ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.402 [INFO][5458] ipam.go 1216: Successfully claimed IPs: [192.168.46.133/26] block=192.168.46.128/26 handle="k8s-pod-network.ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.402 [INFO][5458] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.46.133/26] handle="k8s-pod-network.ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.402 [INFO][5458] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:22.467637 env[1477]: 2024-02-09 09:57:22.402 [INFO][5458] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.46.133/26] IPv6=[] ContainerID="ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" HandleID="k8s-pod-network.ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-eth0" Feb 9 09:57:22.468348 env[1477]: 2024-02-09 09:57:22.404 [INFO][5413] k8s.go 385: Populated endpoint ContainerID="ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-h8556" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-eth0", GenerateName:"calico-apiserver-9c5489b7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"77036e09-d69b-4aa3-9791-651700d1c287", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 57, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9c5489b7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"", Pod:"calico-apiserver-9c5489b7f-h8556", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.46.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia7f82154a99", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:22.468348 env[1477]: 2024-02-09 09:57:22.404 [INFO][5413] k8s.go 386: Calico CNI using IPs: [192.168.46.133/32] ContainerID="ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-h8556" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-eth0" Feb 9 09:57:22.468348 env[1477]: 2024-02-09 09:57:22.405 [INFO][5413] dataplane_linux.go 68: Setting the host side veth name to calia7f82154a99 ContainerID="ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-h8556" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-eth0" Feb 9 09:57:22.468348 env[1477]: 2024-02-09 09:57:22.462 [INFO][5413] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-h8556" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-eth0" Feb 9 09:57:22.468348 env[1477]: 2024-02-09 09:57:22.462 [INFO][5413] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-h8556" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-eth0", GenerateName:"calico-apiserver-9c5489b7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"77036e09-d69b-4aa3-9791-651700d1c287", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 57, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9c5489b7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c", Pod:"calico-apiserver-9c5489b7f-h8556", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.46.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia7f82154a99", MAC:"26:13:9e:f4:87:6c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:22.468348 env[1477]: 2024-02-09 09:57:22.466 [INFO][5413] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-h8556" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--h8556-eth0" Feb 9 09:57:22.473391 env[1477]: time="2024-02-09T09:57:22.473348655Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:57:22.473391 env[1477]: time="2024-02-09T09:57:22.473370669Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:57:22.473391 env[1477]: time="2024-02-09T09:57:22.473377569Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:57:22.473581 env[1477]: time="2024-02-09T09:57:22.473440722Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c pid=5526 runtime=io.containerd.runc.v2 Feb 9 09:57:22.473000 audit[5536]: NETFILTER_CFG table=filter:133 family=2 entries=59 op=nft_register_chain pid=5536 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:22.491442 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali97cbb35b541: link becomes ready Feb 9 09:57:22.491478 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 9 09:57:22.491504 kernel: audit: type=1325 audit(1707472642.473:1344): table=filter:133 family=2 entries=59 op=nft_register_chain pid=5536 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:22.491809 systemd-networkd[1320]: cali97cbb35b541: Gained carrier Feb 9 09:57:22.520670 systemd[1]: Started cri-containerd-ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c.scope. Feb 9 09:57:22.473000 audit[5536]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffd86868b70 a2=0 a3=7ffd86868b5c items=0 ppid=4220 pid=5536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:22.671726 kernel: audit: type=1300 audit(1707472642.473:1344): arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffd86868b70 a2=0 a3=7ffd86868b5c items=0 ppid=4220 pid=5536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:22.671792 kernel: audit: type=1327 audit(1707472642.473:1344): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:22.473000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:22.732631 kernel: audit: type=1400 audit(1707472642.582:1345): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.795051 kernel: audit: type=1400 audit(1707472642.582:1346): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.339 [INFO][5419] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-eth0 calico-apiserver-9c5489b7f- calico-apiserver 7f3f0367-3295-467e-8146-009219c60557 889 0 2024-02-09 09:57:21 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:9c5489b7f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-b0ed76e28d calico-apiserver-9c5489b7f-q48tn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali97cbb35b541 [] []}} ContainerID="4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-q48tn" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-" Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.339 [INFO][5419] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-q48tn" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-eth0" Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.367 [INFO][5465] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" HandleID="k8s-pod-network.4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-eth0" Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.380 [INFO][5465] ipam_plugin.go 268: Auto assigning IP ContainerID="4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" HandleID="k8s-pod-network.4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033d940), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-b0ed76e28d", "pod":"calico-apiserver-9c5489b7f-q48tn", "timestamp":"2024-02-09 09:57:22.366994199 +0000 UTC"}, Hostname:"ci-3510.3.2-a-b0ed76e28d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.380 [INFO][5465] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.402 [INFO][5465] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.403 [INFO][5465] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-b0ed76e28d' Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.405 [INFO][5465] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.409 [INFO][5465] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.414 [INFO][5465] ipam.go 489: Trying affinity for 192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.416 [INFO][5465] ipam.go 155: Attempting to load block cidr=192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.418 [INFO][5465] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.46.128/26 host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.418 [INFO][5465] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.46.128/26 handle="k8s-pod-network.4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.420 [INFO][5465] ipam.go 1682: Creating new handle: k8s-pod-network.4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.423 [INFO][5465] ipam.go 1203: Writing block in order to claim IPs block=192.168.46.128/26 handle="k8s-pod-network.4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.428 [INFO][5465] ipam.go 1216: Successfully claimed IPs: [192.168.46.134/26] block=192.168.46.128/26 handle="k8s-pod-network.4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.428 [INFO][5465] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.46.134/26] handle="k8s-pod-network.4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" host="ci-3510.3.2-a-b0ed76e28d" Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.428 [INFO][5465] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:22.800734 env[1477]: 2024-02-09 09:57:22.428 [INFO][5465] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.46.134/26] IPv6=[] ContainerID="4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" HandleID="k8s-pod-network.4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-eth0" Feb 9 09:57:22.801310 env[1477]: 2024-02-09 09:57:22.430 [INFO][5419] k8s.go 385: Populated endpoint ContainerID="4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-q48tn" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-eth0", GenerateName:"calico-apiserver-9c5489b7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"7f3f0367-3295-467e-8146-009219c60557", ResourceVersion:"889", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 57, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9c5489b7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"", Pod:"calico-apiserver-9c5489b7f-q48tn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.46.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali97cbb35b541", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:22.801310 env[1477]: 2024-02-09 09:57:22.430 [INFO][5419] k8s.go 386: Calico CNI using IPs: [192.168.46.134/32] ContainerID="4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-q48tn" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-eth0" Feb 9 09:57:22.801310 env[1477]: 2024-02-09 09:57:22.430 [INFO][5419] dataplane_linux.go 68: Setting the host side veth name to cali97cbb35b541 ContainerID="4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-q48tn" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-eth0" Feb 9 09:57:22.801310 env[1477]: 2024-02-09 09:57:22.491 [INFO][5419] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-q48tn" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-eth0" Feb 9 09:57:22.801310 env[1477]: 2024-02-09 09:57:22.795 [INFO][5419] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-q48tn" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-eth0", GenerateName:"calico-apiserver-9c5489b7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"7f3f0367-3295-467e-8146-009219c60557", ResourceVersion:"889", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 57, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9c5489b7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff", Pod:"calico-apiserver-9c5489b7f-q48tn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.46.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali97cbb35b541", MAC:"9e:60:db:22:fd:f8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:22.801310 env[1477]: 2024-02-09 09:57:22.799 [INFO][5419] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff" Namespace="calico-apiserver" Pod="calico-apiserver-9c5489b7f-q48tn" WorkloadEndpoint="ci--3510.3.2--a--b0ed76e28d-k8s-calico--apiserver--9c5489b7f--q48tn-eth0" Feb 9 09:57:22.807360 env[1477]: time="2024-02-09T09:57:22.807325412Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:57:22.807360 env[1477]: time="2024-02-09T09:57:22.807348260Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:57:22.807360 env[1477]: time="2024-02-09T09:57:22.807355431Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:57:22.807497 env[1477]: time="2024-02-09T09:57:22.807429055Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff pid=5574 runtime=io.containerd.runc.v2 Feb 9 09:57:22.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.919894 kernel: audit: type=1400 audit(1707472642.582:1347): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.919953 kernel: audit: type=1400 audit(1707472642.582:1348): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.924450 systemd[1]: Started cri-containerd-4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff.scope. Feb 9 09:57:22.982629 kernel: audit: type=1400 audit(1707472642.582:1349): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.045470 kernel: audit: type=1400 audit(1707472642.582:1350): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.108234 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 09:57:22.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.732000 audit: BPF prog-id=180 op=LOAD Feb 9 09:57:22.732000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.732000 audit[5535]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5526 pid=5535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:22.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561356561323736623562303830376537353861613433366465643933 Feb 9 09:57:22.732000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.732000 audit[5535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=5526 pid=5535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:22.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561356561323736623562303830376537353861613433366465643933 Feb 9 09:57:22.732000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.732000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.732000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.732000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.732000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.732000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.732000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.732000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.732000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.805000 audit[5570]: NETFILTER_CFG table=filter:134 family=2 entries=50 op=nft_register_chain pid=5570 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:22.805000 audit[5570]: SYSCALL arch=c000003e syscall=46 success=yes exit=24496 a0=3 a1=7ffeb0608020 a2=0 a3=7ffeb060800c items=0 ppid=4220 pid=5570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:22.805000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:22.732000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.732000 audit: BPF prog-id=181 op=LOAD Feb 9 09:57:22.732000 audit[5535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002244f0 items=0 ppid=5526 pid=5535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:22.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561356561323736623562303830376537353861613433366465643933 Feb 9 09:57:22.855000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.855000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.855000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.855000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.855000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.855000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.855000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.855000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.855000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.855000 audit: BPF prog-id=182 op=LOAD Feb 9 09:57:22.855000 audit[5535]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000224538 items=0 ppid=5526 pid=5535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:22.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561356561323736623562303830376537353861613433366465643933 Feb 9 09:57:22.981000 audit: BPF prog-id=182 op=UNLOAD Feb 9 09:57:22.981000 audit: BPF prog-id=181 op=UNLOAD Feb 9 09:57:22.981000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.981000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.981000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.981000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.981000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.981000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.981000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.981000 audit[5535]: AVC avc: denied { perfmon } for pid=5535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.981000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.981000 audit[5535]: AVC avc: denied { bpf } for pid=5535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:22.981000 audit[5535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000224be0 items=0 ppid=5526 pid=5535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:22.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561356561323736623562303830376537353861613433366465643933 Feb 9 09:57:23.108000 audit[5584]: AVC avc: denied { bpf } for pid=5584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.108000 audit: BPF prog-id=185 op=LOAD Feb 9 09:57:23.108000 audit[5584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000232ee0 items=0 ppid=5574 pid=5584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:23.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465343638373136386133336133373034393334643764313330343438 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { bpf } for pid=5584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { bpf } for pid=5584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { perfmon } for pid=5584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { perfmon } for pid=5584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { perfmon } for pid=5584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { perfmon } for pid=5584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { perfmon } for pid=5584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { bpf } for pid=5584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { bpf } for pid=5584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit: BPF prog-id=186 op=LOAD Feb 9 09:57:23.134000 audit[5584]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000232f28 items=0 ppid=5574 pid=5584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:23.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465343638373136386133336133373034393334643764313330343438 Feb 9 09:57:23.134000 audit: BPF prog-id=186 op=UNLOAD Feb 9 09:57:23.134000 audit: BPF prog-id=185 op=UNLOAD Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { bpf } for pid=5584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { bpf } for pid=5584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { bpf } for pid=5584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { perfmon } for pid=5584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { perfmon } for pid=5584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { perfmon } for pid=5584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { perfmon } for pid=5584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { perfmon } for pid=5584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { bpf } for pid=5584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit[5584]: AVC avc: denied { bpf } for pid=5584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.134000 audit: BPF prog-id=187 op=LOAD Feb 9 09:57:23.134000 audit[5584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000233338 items=0 ppid=5574 pid=5584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:23.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465343638373136386133336133373034393334643764313330343438 Feb 9 09:57:23.151796 env[1477]: time="2024-02-09T09:57:23.151738153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9c5489b7f-q48tn,Uid:7f3f0367-3295-467e-8146-009219c60557,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff\"" Feb 9 09:57:23.163202 env[1477]: time="2024-02-09T09:57:23.163178420Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9c5489b7f-h8556,Uid:77036e09-d69b-4aa3-9791-651700d1c287,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c\"" Feb 9 09:57:23.320327 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3408612436.mount: Deactivated successfully. Feb 9 09:57:23.602854 systemd-networkd[1320]: cali97cbb35b541: Gained IPv6LL Feb 9 09:57:23.639883 env[1477]: time="2024-02-09T09:57:23.639833509Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:23.640465 env[1477]: time="2024-02-09T09:57:23.640451680Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:23.641138 env[1477]: time="2024-02-09T09:57:23.641116351Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:23.642267 env[1477]: time="2024-02-09T09:57:23.642228123Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:23.642541 env[1477]: time="2024-02-09T09:57:23.642502682Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 09:57:23.642917 env[1477]: time="2024-02-09T09:57:23.642868505Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 09:57:23.643504 env[1477]: time="2024-02-09T09:57:23.643491321Z" level=info msg="CreateContainer within sandbox \"36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 09:57:23.648618 env[1477]: time="2024-02-09T09:57:23.648564222Z" level=info msg="CreateContainer within sandbox \"36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"24c5e78a4f52a87c23d16a6c5465474f8c46d64beb1d5704370dbac95a9afd01\"" Feb 9 09:57:23.648797 env[1477]: time="2024-02-09T09:57:23.648768455Z" level=info msg="StartContainer for \"24c5e78a4f52a87c23d16a6c5465474f8c46d64beb1d5704370dbac95a9afd01\"" Feb 9 09:57:23.657854 systemd[1]: Started cri-containerd-24c5e78a4f52a87c23d16a6c5465474f8c46d64beb1d5704370dbac95a9afd01.scope. Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4729 pid=5624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633565373861346635326138376332336431366136633534363534 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit: BPF prog-id=188 op=LOAD Feb 9 09:57:23.665000 audit[5624]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000277c70 items=0 ppid=4729 pid=5624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633565373861346635326138376332336431366136633534363534 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit: BPF prog-id=189 op=LOAD Feb 9 09:57:23.665000 audit[5624]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000277cb8 items=0 ppid=4729 pid=5624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633565373861346635326138376332336431366136633534363534 Feb 9 09:57:23.665000 audit: BPF prog-id=189 op=UNLOAD Feb 9 09:57:23.665000 audit: BPF prog-id=188 op=UNLOAD Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { perfmon } for pid=5624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit[5624]: AVC avc: denied { bpf } for pid=5624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.665000 audit: BPF prog-id=190 op=LOAD Feb 9 09:57:23.665000 audit[5624]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000277d48 items=0 ppid=4729 pid=5624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633565373861346635326138376332336431366136633534363534 Feb 9 09:57:23.692478 env[1477]: time="2024-02-09T09:57:23.692429208Z" level=info msg="StartContainer for \"24c5e78a4f52a87c23d16a6c5465474f8c46d64beb1d5704370dbac95a9afd01\" returns successfully" Feb 9 09:57:24.434865 systemd-networkd[1320]: calia7f82154a99: Gained IPv6LL Feb 9 09:57:38.750000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:38.777354 kernel: kauditd_printk_skb: 177 callbacks suppressed Feb 9 09:57:38.777412 kernel: audit: type=1400 audit(1707472658.750:1384): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:38.750000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020f33b0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:57:38.868632 kernel: audit: type=1300 audit(1707472658.750:1384): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020f33b0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:57:38.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:39.076910 kernel: audit: type=1327 audit(1707472658.750:1384): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:39.076950 kernel: audit: type=1400 audit(1707472658.750:1385): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:38.750000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:39.165001 kernel: audit: type=1300 audit(1707472658.750:1385): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000293a20 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:57:38.750000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000293a20 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:57:39.282464 kernel: audit: type=1327 audit(1707472658.750:1385): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:38.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:38.805000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:39.462633 kernel: audit: type=1400 audit(1707472658.805:1386): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:39.462706 kernel: audit: type=1300 audit(1707472658.805:1386): arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c014471d40 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:57:38.805000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c014471d40 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:57:39.560968 kernel: audit: type=1327 audit(1707472658.805:1386): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:57:38.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:57:39.655015 kernel: audit: type=1400 audit(1707472658.805:1387): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:38.805000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:38.805000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:38.805000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:38.805000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c014471da0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:57:38.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:57:38.805000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00bf69830 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:57:38.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:57:38.805000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0034aa060 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:57:38.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:57:38.807000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:38.807000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c013c62e80 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:57:38.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:57:38.819000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:38.819000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c004ebbad0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:57:38.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:57:42.543864 env[1477]: time="2024-02-09T09:57:42.543762230Z" level=info msg="StopPodSandbox for \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\"" Feb 9 09:57:42.581422 env[1477]: 2024-02-09 09:57:42.563 [WARNING][5721] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"045ae4c6-7f62-4e3b-a026-fbc7ad050ea3", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 55, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb", Pod:"coredns-787d4945fb-n2txl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4aea9bb717c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:42.581422 env[1477]: 2024-02-09 09:57:42.564 [INFO][5721] k8s.go 578: Cleaning up netns ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:57:42.581422 env[1477]: 2024-02-09 09:57:42.564 [INFO][5721] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" iface="eth0" netns="" Feb 9 09:57:42.581422 env[1477]: 2024-02-09 09:57:42.564 [INFO][5721] k8s.go 585: Releasing IP address(es) ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:57:42.581422 env[1477]: 2024-02-09 09:57:42.564 [INFO][5721] utils.go 188: Calico CNI releasing IP address ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:57:42.581422 env[1477]: 2024-02-09 09:57:42.574 [INFO][5741] ipam_plugin.go 415: Releasing address using handleID ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" HandleID="k8s-pod-network.8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:42.581422 env[1477]: 2024-02-09 09:57:42.574 [INFO][5741] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:42.581422 env[1477]: 2024-02-09 09:57:42.574 [INFO][5741] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:42.581422 env[1477]: 2024-02-09 09:57:42.578 [WARNING][5741] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" HandleID="k8s-pod-network.8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:42.581422 env[1477]: 2024-02-09 09:57:42.578 [INFO][5741] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" HandleID="k8s-pod-network.8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:42.581422 env[1477]: 2024-02-09 09:57:42.579 [INFO][5741] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:42.581422 env[1477]: 2024-02-09 09:57:42.580 [INFO][5721] k8s.go 591: Teardown processing complete. ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:57:42.581814 env[1477]: time="2024-02-09T09:57:42.581437000Z" level=info msg="TearDown network for sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\" successfully" Feb 9 09:57:42.581814 env[1477]: time="2024-02-09T09:57:42.581458114Z" level=info msg="StopPodSandbox for \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\" returns successfully" Feb 9 09:57:42.581881 env[1477]: time="2024-02-09T09:57:42.581824525Z" level=info msg="RemovePodSandbox for \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\"" Feb 9 09:57:42.581881 env[1477]: time="2024-02-09T09:57:42.581849838Z" level=info msg="Forcibly stopping sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\"" Feb 9 09:57:42.620888 env[1477]: 2024-02-09 09:57:42.600 [WARNING][5768] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"045ae4c6-7f62-4e3b-a026-fbc7ad050ea3", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 55, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"525f2b8096bd3df0b0bff67408eb3a22459b63f0d4c3cd4732682ade41f8dafb", Pod:"coredns-787d4945fb-n2txl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4aea9bb717c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:42.620888 env[1477]: 2024-02-09 09:57:42.600 [INFO][5768] k8s.go 578: Cleaning up netns ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:57:42.620888 env[1477]: 2024-02-09 09:57:42.600 [INFO][5768] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" iface="eth0" netns="" Feb 9 09:57:42.620888 env[1477]: 2024-02-09 09:57:42.600 [INFO][5768] k8s.go 585: Releasing IP address(es) ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:57:42.620888 env[1477]: 2024-02-09 09:57:42.600 [INFO][5768] utils.go 188: Calico CNI releasing IP address ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:57:42.620888 env[1477]: 2024-02-09 09:57:42.612 [INFO][5785] ipam_plugin.go 415: Releasing address using handleID ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" HandleID="k8s-pod-network.8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:42.620888 env[1477]: 2024-02-09 09:57:42.612 [INFO][5785] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:42.620888 env[1477]: 2024-02-09 09:57:42.613 [INFO][5785] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:42.620888 env[1477]: 2024-02-09 09:57:42.618 [WARNING][5785] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" HandleID="k8s-pod-network.8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:42.620888 env[1477]: 2024-02-09 09:57:42.618 [INFO][5785] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" HandleID="k8s-pod-network.8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--n2txl-eth0" Feb 9 09:57:42.620888 env[1477]: 2024-02-09 09:57:42.619 [INFO][5785] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:42.620888 env[1477]: 2024-02-09 09:57:42.620 [INFO][5768] k8s.go 591: Teardown processing complete. ContainerID="8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab" Feb 9 09:57:42.620888 env[1477]: time="2024-02-09T09:57:42.620871884Z" level=info msg="TearDown network for sandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\" successfully" Feb 9 09:57:42.622580 env[1477]: time="2024-02-09T09:57:42.622542124Z" level=info msg="RemovePodSandbox \"8a12e705f12b0bb5e3fa8c7e08d54db156c697bc5829f989595674f8d6342fab\" returns successfully" Feb 9 09:57:42.622834 env[1477]: time="2024-02-09T09:57:42.622779441Z" level=info msg="StopPodSandbox for \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\"" Feb 9 09:57:42.663789 env[1477]: 2024-02-09 09:57:42.644 [WARNING][5816] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ff9f79f6-c361-4d6e-b829-523c638d7830", ResourceVersion:"766", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1", Pod:"csi-node-driver-hp56n", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.46.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali86e2d97ca8c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:42.663789 env[1477]: 2024-02-09 09:57:42.644 [INFO][5816] k8s.go 578: Cleaning up netns ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:57:42.663789 env[1477]: 2024-02-09 09:57:42.644 [INFO][5816] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" iface="eth0" netns="" Feb 9 09:57:42.663789 env[1477]: 2024-02-09 09:57:42.644 [INFO][5816] k8s.go 585: Releasing IP address(es) ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:57:42.663789 env[1477]: 2024-02-09 09:57:42.644 [INFO][5816] utils.go 188: Calico CNI releasing IP address ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:57:42.663789 env[1477]: 2024-02-09 09:57:42.655 [INFO][5832] ipam_plugin.go 415: Releasing address using handleID ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" HandleID="k8s-pod-network.3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:42.663789 env[1477]: 2024-02-09 09:57:42.656 [INFO][5832] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:42.663789 env[1477]: 2024-02-09 09:57:42.656 [INFO][5832] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:42.663789 env[1477]: 2024-02-09 09:57:42.661 [WARNING][5832] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" HandleID="k8s-pod-network.3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:42.663789 env[1477]: 2024-02-09 09:57:42.661 [INFO][5832] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" HandleID="k8s-pod-network.3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:42.663789 env[1477]: 2024-02-09 09:57:42.662 [INFO][5832] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:42.663789 env[1477]: 2024-02-09 09:57:42.663 [INFO][5816] k8s.go 591: Teardown processing complete. ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:57:42.664238 env[1477]: time="2024-02-09T09:57:42.663801522Z" level=info msg="TearDown network for sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\" successfully" Feb 9 09:57:42.664238 env[1477]: time="2024-02-09T09:57:42.663823109Z" level=info msg="StopPodSandbox for \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\" returns successfully" Feb 9 09:57:42.664238 env[1477]: time="2024-02-09T09:57:42.664136015Z" level=info msg="RemovePodSandbox for \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\"" Feb 9 09:57:42.664238 env[1477]: time="2024-02-09T09:57:42.664157077Z" level=info msg="Forcibly stopping sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\"" Feb 9 09:57:42.709639 env[1477]: 2024-02-09 09:57:42.687 [WARNING][5856] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ff9f79f6-c361-4d6e-b829-523c638d7830", ResourceVersion:"766", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1", Pod:"csi-node-driver-hp56n", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.46.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali86e2d97ca8c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:42.709639 env[1477]: 2024-02-09 09:57:42.687 [INFO][5856] k8s.go 578: Cleaning up netns ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:57:42.709639 env[1477]: 2024-02-09 09:57:42.687 [INFO][5856] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" iface="eth0" netns="" Feb 9 09:57:42.709639 env[1477]: 2024-02-09 09:57:42.687 [INFO][5856] k8s.go 585: Releasing IP address(es) ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:57:42.709639 env[1477]: 2024-02-09 09:57:42.687 [INFO][5856] utils.go 188: Calico CNI releasing IP address ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:57:42.709639 env[1477]: 2024-02-09 09:57:42.701 [INFO][5874] ipam_plugin.go 415: Releasing address using handleID ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" HandleID="k8s-pod-network.3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:42.709639 env[1477]: 2024-02-09 09:57:42.701 [INFO][5874] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:42.709639 env[1477]: 2024-02-09 09:57:42.701 [INFO][5874] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:42.709639 env[1477]: 2024-02-09 09:57:42.706 [WARNING][5874] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" HandleID="k8s-pod-network.3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:42.709639 env[1477]: 2024-02-09 09:57:42.706 [INFO][5874] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" HandleID="k8s-pod-network.3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-csi--node--driver--hp56n-eth0" Feb 9 09:57:42.709639 env[1477]: 2024-02-09 09:57:42.708 [INFO][5874] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:42.709639 env[1477]: 2024-02-09 09:57:42.708 [INFO][5856] k8s.go 591: Teardown processing complete. ContainerID="3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb" Feb 9 09:57:42.710074 env[1477]: time="2024-02-09T09:57:42.709658753Z" level=info msg="TearDown network for sandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\" successfully" Feb 9 09:57:42.711339 env[1477]: time="2024-02-09T09:57:42.711290992Z" level=info msg="RemovePodSandbox \"3e0cf50c447de332362a3c57b9b6d125e82760a815d96ec8877300ccd07dd0cb\" returns successfully" Feb 9 09:57:42.711611 env[1477]: time="2024-02-09T09:57:42.711594626Z" level=info msg="StopPodSandbox for \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\"" Feb 9 09:57:42.761402 env[1477]: 2024-02-09 09:57:42.736 [WARNING][5904] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0", GenerateName:"calico-kube-controllers-57dd9d46cc-", Namespace:"calico-system", SelfLink:"", UID:"86f8e619-cd35-46e0-b241-8ce4a323f389", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57dd9d46cc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912", Pod:"calico-kube-controllers-57dd9d46cc-hc6pw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.46.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali73786ae905d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:42.761402 env[1477]: 2024-02-09 09:57:42.736 [INFO][5904] k8s.go 578: Cleaning up netns ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:57:42.761402 env[1477]: 2024-02-09 09:57:42.736 [INFO][5904] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" iface="eth0" netns="" Feb 9 09:57:42.761402 env[1477]: 2024-02-09 09:57:42.736 [INFO][5904] k8s.go 585: Releasing IP address(es) ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:57:42.761402 env[1477]: 2024-02-09 09:57:42.736 [INFO][5904] utils.go 188: Calico CNI releasing IP address ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:57:42.761402 env[1477]: 2024-02-09 09:57:42.751 [INFO][5918] ipam_plugin.go 415: Releasing address using handleID ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" HandleID="k8s-pod-network.1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:42.761402 env[1477]: 2024-02-09 09:57:42.751 [INFO][5918] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:42.761402 env[1477]: 2024-02-09 09:57:42.752 [INFO][5918] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:42.761402 env[1477]: 2024-02-09 09:57:42.757 [WARNING][5918] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" HandleID="k8s-pod-network.1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:42.761402 env[1477]: 2024-02-09 09:57:42.757 [INFO][5918] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" HandleID="k8s-pod-network.1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:42.761402 env[1477]: 2024-02-09 09:57:42.759 [INFO][5918] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:42.761402 env[1477]: 2024-02-09 09:57:42.760 [INFO][5904] k8s.go 591: Teardown processing complete. ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:57:42.762186 env[1477]: time="2024-02-09T09:57:42.761434843Z" level=info msg="TearDown network for sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\" successfully" Feb 9 09:57:42.762186 env[1477]: time="2024-02-09T09:57:42.761475893Z" level=info msg="StopPodSandbox for \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\" returns successfully" Feb 9 09:57:42.762186 env[1477]: time="2024-02-09T09:57:42.761980568Z" level=info msg="RemovePodSandbox for \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\"" Feb 9 09:57:42.762186 env[1477]: time="2024-02-09T09:57:42.762017263Z" level=info msg="Forcibly stopping sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\"" Feb 9 09:57:42.793000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:42.793000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00085a480 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:57:42.793000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:42.793000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:42.793000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c0006b9f60 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:57:42.793000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:42.793000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:42.793000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00085a4a0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:57:42.793000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:42.794000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:42.794000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000293f80 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:57:42.794000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:42.842106 env[1477]: 2024-02-09 09:57:42.803 [WARNING][5951] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0", GenerateName:"calico-kube-controllers-57dd9d46cc-", Namespace:"calico-system", SelfLink:"", UID:"86f8e619-cd35-46e0-b241-8ce4a323f389", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57dd9d46cc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"78b5bee257c04b2dd45d8db8db1cc0a5301a59af04a9767113e88c6cda869912", Pod:"calico-kube-controllers-57dd9d46cc-hc6pw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.46.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali73786ae905d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:42.842106 env[1477]: 2024-02-09 09:57:42.804 [INFO][5951] k8s.go 578: Cleaning up netns ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:57:42.842106 env[1477]: 2024-02-09 09:57:42.804 [INFO][5951] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" iface="eth0" netns="" Feb 9 09:57:42.842106 env[1477]: 2024-02-09 09:57:42.804 [INFO][5951] k8s.go 585: Releasing IP address(es) ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:57:42.842106 env[1477]: 2024-02-09 09:57:42.804 [INFO][5951] utils.go 188: Calico CNI releasing IP address ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:57:42.842106 env[1477]: 2024-02-09 09:57:42.828 [INFO][5969] ipam_plugin.go 415: Releasing address using handleID ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" HandleID="k8s-pod-network.1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:42.842106 env[1477]: 2024-02-09 09:57:42.828 [INFO][5969] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:42.842106 env[1477]: 2024-02-09 09:57:42.828 [INFO][5969] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:42.842106 env[1477]: 2024-02-09 09:57:42.837 [WARNING][5969] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" HandleID="k8s-pod-network.1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:42.842106 env[1477]: 2024-02-09 09:57:42.837 [INFO][5969] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" HandleID="k8s-pod-network.1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-calico--kube--controllers--57dd9d46cc--hc6pw-eth0" Feb 9 09:57:42.842106 env[1477]: 2024-02-09 09:57:42.839 [INFO][5969] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:42.842106 env[1477]: 2024-02-09 09:57:42.840 [INFO][5951] k8s.go 591: Teardown processing complete. ContainerID="1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc" Feb 9 09:57:42.842903 env[1477]: time="2024-02-09T09:57:42.842108910Z" level=info msg="TearDown network for sandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\" successfully" Feb 9 09:57:42.844817 env[1477]: time="2024-02-09T09:57:42.844778150Z" level=info msg="RemovePodSandbox \"1bbbd939ceff33df0610fa5142911a7a7b7d737b877bfac72c007d7ca829dbbc\" returns successfully" Feb 9 09:57:42.845317 env[1477]: time="2024-02-09T09:57:42.845274922Z" level=info msg="StopPodSandbox for \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\"" Feb 9 09:57:42.927624 env[1477]: 2024-02-09 09:57:42.887 [WARNING][5999] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"ee9dcfdb-fb61-4be4-9821-f2da6b546baa", ResourceVersion:"803", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 55, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3", Pod:"coredns-787d4945fb-d5lzv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali69962a0140c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:42.927624 env[1477]: 2024-02-09 09:57:42.888 [INFO][5999] k8s.go 578: Cleaning up netns ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:57:42.927624 env[1477]: 2024-02-09 09:57:42.888 [INFO][5999] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" iface="eth0" netns="" Feb 9 09:57:42.927624 env[1477]: 2024-02-09 09:57:42.888 [INFO][5999] k8s.go 585: Releasing IP address(es) ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:57:42.927624 env[1477]: 2024-02-09 09:57:42.888 [INFO][5999] utils.go 188: Calico CNI releasing IP address ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:57:42.927624 env[1477]: 2024-02-09 09:57:42.913 [INFO][6015] ipam_plugin.go 415: Releasing address using handleID ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" HandleID="k8s-pod-network.5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:42.927624 env[1477]: 2024-02-09 09:57:42.913 [INFO][6015] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:42.927624 env[1477]: 2024-02-09 09:57:42.914 [INFO][6015] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:42.927624 env[1477]: 2024-02-09 09:57:42.922 [WARNING][6015] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" HandleID="k8s-pod-network.5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:42.927624 env[1477]: 2024-02-09 09:57:42.923 [INFO][6015] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" HandleID="k8s-pod-network.5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:42.927624 env[1477]: 2024-02-09 09:57:42.924 [INFO][6015] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:42.927624 env[1477]: 2024-02-09 09:57:42.926 [INFO][5999] k8s.go 591: Teardown processing complete. ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:57:42.928759 env[1477]: time="2024-02-09T09:57:42.927615649Z" level=info msg="TearDown network for sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\" successfully" Feb 9 09:57:42.928759 env[1477]: time="2024-02-09T09:57:42.927651863Z" level=info msg="StopPodSandbox for \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\" returns successfully" Feb 9 09:57:42.928759 env[1477]: time="2024-02-09T09:57:42.928210951Z" level=info msg="RemovePodSandbox for \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\"" Feb 9 09:57:42.928759 env[1477]: time="2024-02-09T09:57:42.928263019Z" level=info msg="Forcibly stopping sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\"" Feb 9 09:57:43.009548 env[1477]: 2024-02-09 09:57:42.970 [WARNING][6046] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"ee9dcfdb-fb61-4be4-9821-f2da6b546baa", ResourceVersion:"803", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 55, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-b0ed76e28d", ContainerID:"654deef7000d84926a93d9e37396339752f9bac440380135e73ceb1fb94fe5b3", Pod:"coredns-787d4945fb-d5lzv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali69962a0140c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:43.009548 env[1477]: 2024-02-09 09:57:42.971 [INFO][6046] k8s.go 578: Cleaning up netns ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:57:43.009548 env[1477]: 2024-02-09 09:57:42.971 [INFO][6046] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" iface="eth0" netns="" Feb 9 09:57:43.009548 env[1477]: 2024-02-09 09:57:42.971 [INFO][6046] k8s.go 585: Releasing IP address(es) ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:57:43.009548 env[1477]: 2024-02-09 09:57:42.971 [INFO][6046] utils.go 188: Calico CNI releasing IP address ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:57:43.009548 env[1477]: 2024-02-09 09:57:42.994 [INFO][6062] ipam_plugin.go 415: Releasing address using handleID ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" HandleID="k8s-pod-network.5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:43.009548 env[1477]: 2024-02-09 09:57:42.994 [INFO][6062] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:43.009548 env[1477]: 2024-02-09 09:57:42.994 [INFO][6062] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:43.009548 env[1477]: 2024-02-09 09:57:43.004 [WARNING][6062] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" HandleID="k8s-pod-network.5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:43.009548 env[1477]: 2024-02-09 09:57:43.004 [INFO][6062] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" HandleID="k8s-pod-network.5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Workload="ci--3510.3.2--a--b0ed76e28d-k8s-coredns--787d4945fb--d5lzv-eth0" Feb 9 09:57:43.009548 env[1477]: 2024-02-09 09:57:43.006 [INFO][6062] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:43.009548 env[1477]: 2024-02-09 09:57:43.008 [INFO][6046] k8s.go 591: Teardown processing complete. ContainerID="5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c" Feb 9 09:57:43.010316 env[1477]: time="2024-02-09T09:57:43.009570994Z" level=info msg="TearDown network for sandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\" successfully" Feb 9 09:57:43.012411 env[1477]: time="2024-02-09T09:57:43.012377829Z" level=info msg="RemovePodSandbox \"5e39871f65f0f80a22c555ff841802ae87f3b770c5d2a4ee1b977b4bff0e686c\" returns successfully" Feb 9 09:57:47.049733 env[1477]: time="2024-02-09T09:57:47.049678273Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:47.050240 env[1477]: time="2024-02-09T09:57:47.050199730Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:47.051142 env[1477]: time="2024-02-09T09:57:47.051100144Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:47.052302 env[1477]: time="2024-02-09T09:57:47.052261234Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:47.052575 env[1477]: time="2024-02-09T09:57:47.052535327Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 09:57:47.053126 env[1477]: time="2024-02-09T09:57:47.053061425Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 09:57:47.053937 env[1477]: time="2024-02-09T09:57:47.053907766Z" level=info msg="CreateContainer within sandbox \"4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 09:57:47.058176 env[1477]: time="2024-02-09T09:57:47.058133424Z" level=info msg="CreateContainer within sandbox \"4e4687168a33a3704934d7d130448e31b6e04470488aa4f1e591072b5052d8ff\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"96d74ab062a4a59a81700c375ae83b67aa1f2739f9b0f2d2bf3c5d93ecddfdb9\"" Feb 9 09:57:47.058419 env[1477]: time="2024-02-09T09:57:47.058406361Z" level=info msg="StartContainer for \"96d74ab062a4a59a81700c375ae83b67aa1f2739f9b0f2d2bf3c5d93ecddfdb9\"" Feb 9 09:57:47.080424 systemd[1]: Started cri-containerd-96d74ab062a4a59a81700c375ae83b67aa1f2739f9b0f2d2bf3c5d93ecddfdb9.scope. Feb 9 09:57:47.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.113453 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 09:57:47.113497 kernel: audit: type=1400 audit(1707472667.085:1396): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.239336 kernel: audit: type=1400 audit(1707472667.085:1397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.239373 kernel: audit: type=1400 audit(1707472667.085:1398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.365446 kernel: audit: type=1400 audit(1707472667.085:1399): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.365484 kernel: audit: type=1400 audit(1707472667.085:1400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.428704 kernel: audit: type=1400 audit(1707472667.085:1401): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.491975 kernel: audit: type=1400 audit(1707472667.085:1402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.555611 kernel: audit: type=1400 audit(1707472667.085:1403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.619738 kernel: audit: type=1400 audit(1707472667.085:1404): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.649675 env[1477]: time="2024-02-09T09:57:47.649652122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:47.650397 env[1477]: time="2024-02-09T09:57:47.650384496Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:47.651213 env[1477]: time="2024-02-09T09:57:47.651200284Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:47.652079 env[1477]: time="2024-02-09T09:57:47.652066265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:47.652468 env[1477]: time="2024-02-09T09:57:47.652454243Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 09:57:47.652729 env[1477]: time="2024-02-09T09:57:47.652713086Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 09:57:47.653604 env[1477]: time="2024-02-09T09:57:47.653558731Z" level=info msg="CreateContainer within sandbox \"ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 09:57:47.683515 kernel: audit: type=1400 audit(1707472667.175:1405): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.175000 audit: BPF prog-id=191 op=LOAD Feb 9 09:57:47.176000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.176000 audit[6116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5574 pid=6116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:47.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643734616230363261346135396138313730306333373561653833 Feb 9 09:57:47.176000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.176000 audit[6116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5574 pid=6116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:47.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643734616230363261346135396138313730306333373561653833 Feb 9 09:57:47.176000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.176000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.176000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.176000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.176000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.176000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.176000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.176000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.176000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.176000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.176000 audit: BPF prog-id=192 op=LOAD Feb 9 09:57:47.176000 audit[6116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002269b0 items=0 ppid=5574 pid=6116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:47.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643734616230363261346135396138313730306333373561653833 Feb 9 09:57:47.301000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.301000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.301000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.301000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.301000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.301000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.301000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.301000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.301000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.301000 audit: BPF prog-id=193 op=LOAD Feb 9 09:57:47.301000 audit[6116]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002269f8 items=0 ppid=5574 pid=6116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:47.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643734616230363261346135396138313730306333373561653833 Feb 9 09:57:47.428000 audit: BPF prog-id=193 op=UNLOAD Feb 9 09:57:47.428000 audit: BPF prog-id=192 op=UNLOAD Feb 9 09:57:47.428000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.428000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.428000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.428000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.428000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.428000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.428000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.428000 audit[6116]: AVC avc: denied { perfmon } for pid=6116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.428000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.428000 audit[6116]: AVC avc: denied { bpf } for pid=6116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.428000 audit: BPF prog-id=194 op=LOAD Feb 9 09:57:47.428000 audit[6116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000226e08 items=0 ppid=5574 pid=6116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:47.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643734616230363261346135396138313730306333373561653833 Feb 9 09:57:47.749036 env[1477]: time="2024-02-09T09:57:47.749014352Z" level=info msg="CreateContainer within sandbox \"ea5ea276b5b0807e758aa436ded9355985c6c426766340c6db7fd93d56b5569c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"bae65d1f93c68a7fd7bf54be9430c7a2cfcb8855552ae2c03eb3cfe16511c0ca\"" Feb 9 09:57:47.749329 env[1477]: time="2024-02-09T09:57:47.749313993Z" level=info msg="StartContainer for \"bae65d1f93c68a7fd7bf54be9430c7a2cfcb8855552ae2c03eb3cfe16511c0ca\"" Feb 9 09:57:47.768649 systemd[1]: Started cri-containerd-bae65d1f93c68a7fd7bf54be9430c7a2cfcb8855552ae2c03eb3cfe16511c0ca.scope. Feb 9 09:57:47.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit: BPF prog-id=195 op=LOAD Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5526 pid=6139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:47.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261653635643166393363363861376664376266353462653934333063 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=5526 pid=6139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:47.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261653635643166393363363861376664376266353462653934333063 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit: BPF prog-id=196 op=LOAD Feb 9 09:57:47.775000 audit[6139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003e0120 items=0 ppid=5526 pid=6139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:47.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261653635643166393363363861376664376266353462653934333063 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit: BPF prog-id=197 op=LOAD Feb 9 09:57:47.775000 audit[6139]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003e0168 items=0 ppid=5526 pid=6139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:47.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261653635643166393363363861376664376266353462653934333063 Feb 9 09:57:47.775000 audit: BPF prog-id=197 op=UNLOAD Feb 9 09:57:47.775000 audit: BPF prog-id=196 op=UNLOAD Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { perfmon } for pid=6139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit[6139]: AVC avc: denied { bpf } for pid=6139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:47.775000 audit: BPF prog-id=198 op=LOAD Feb 9 09:57:47.775000 audit[6139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003e0578 items=0 ppid=5526 pid=6139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:47.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261653635643166393363363861376664376266353462653934333063 Feb 9 09:57:47.777439 env[1477]: time="2024-02-09T09:57:47.776761426Z" level=info msg="StartContainer for \"96d74ab062a4a59a81700c375ae83b67aa1f2739f9b0f2d2bf3c5d93ecddfdb9\" returns successfully" Feb 9 09:57:47.810741 env[1477]: time="2024-02-09T09:57:47.810702105Z" level=info msg="StartContainer for \"bae65d1f93c68a7fd7bf54be9430c7a2cfcb8855552ae2c03eb3cfe16511c0ca\" returns successfully" Feb 9 09:57:47.955694 kubelet[2599]: I0209 09:57:47.955628 2599 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-9c5489b7f-q48tn" podStartSLOduration=-9.223372009899193e+09 pod.CreationTimestamp="2024-02-09 09:57:21 +0000 UTC" firstStartedPulling="2024-02-09 09:57:23.152234698 +0000 UTC m=+100.662571855" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:57:47.955092187 +0000 UTC m=+125.465429348" watchObservedRunningTime="2024-02-09 09:57:47.955583055 +0000 UTC m=+125.465920218" Feb 9 09:57:47.960545 kubelet[2599]: I0209 09:57:47.960526 2599 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-9c5489b7f-h8556" podStartSLOduration=-9.223372009894274e+09 pod.CreationTimestamp="2024-02-09 09:57:21 +0000 UTC" firstStartedPulling="2024-02-09 09:57:23.163695713 +0000 UTC m=+100.674032879" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:57:47.960073822 +0000 UTC m=+125.470410982" watchObservedRunningTime="2024-02-09 09:57:47.960501748 +0000 UTC m=+125.470838904" Feb 9 09:57:47.976000 audit[6234]: NETFILTER_CFG table=filter:135 family=2 entries=8 op=nft_register_rule pid=6234 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:47.976000 audit[6234]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffde94635a0 a2=0 a3=7ffde946358c items=0 ppid=2893 pid=6234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:47.976000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:47.977000 audit[6234]: NETFILTER_CFG table=nat:136 family=2 entries=78 op=nft_register_rule pid=6234 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:47.977000 audit[6234]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffde94635a0 a2=0 a3=7ffde946358c items=0 ppid=2893 pid=6234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:47.977000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:48.018000 audit[6260]: NETFILTER_CFG table=filter:137 family=2 entries=8 op=nft_register_rule pid=6260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:48.018000 audit[6260]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc21f0eda0 a2=0 a3=7ffc21f0ed8c items=0 ppid=2893 pid=6260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:48.018000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:48.019000 audit[6260]: NETFILTER_CFG table=nat:138 family=2 entries=78 op=nft_register_rule pid=6260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:48.019000 audit[6260]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc21f0eda0 a2=0 a3=7ffc21f0ed8c items=0 ppid=2893 pid=6260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:48.019000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:48.053000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 09:57:48.053000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bea360 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 09:57:48.053000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:57:48.124000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 09:57:48.124000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f00820 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 09:57:48.124000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:57:52.358000 audit[6328]: NETFILTER_CFG table=filter:139 family=2 entries=7 op=nft_register_rule pid=6328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:52.387033 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 9 09:57:52.387079 kernel: audit: type=1325 audit(1707472672.358:1438): table=filter:139 family=2 entries=7 op=nft_register_rule pid=6328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:52.358000 audit[6328]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff5aef3c30 a2=0 a3=7fff5aef3c1c items=0 ppid=2893 pid=6328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:52.543832 kernel: audit: type=1300 audit(1707472672.358:1438): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff5aef3c30 a2=0 a3=7fff5aef3c1c items=0 ppid=2893 pid=6328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:52.543865 kernel: audit: type=1327 audit(1707472672.358:1438): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:52.358000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:52.359000 audit[6328]: NETFILTER_CFG table=nat:140 family=2 entries=85 op=nft_register_chain pid=6328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:52.359000 audit[6328]: SYSCALL arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7fff5aef3c30 a2=0 a3=7fff5aef3c1c items=0 ppid=2893 pid=6328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:52.671638 kernel: audit: type=1325 audit(1707472672.359:1439): table=nat:140 family=2 entries=85 op=nft_register_chain pid=6328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:52.671673 kernel: audit: type=1300 audit(1707472672.359:1439): arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7fff5aef3c30 a2=0 a3=7fff5aef3c1c items=0 ppid=2893 pid=6328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:52.359000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:52.827411 kernel: audit: type=1327 audit(1707472672.359:1439): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:52.846000 audit[6354]: NETFILTER_CFG table=filter:141 family=2 entries=6 op=nft_register_rule pid=6354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:52.846000 audit[6354]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fffc281baa0 a2=0 a3=7fffc281ba8c items=0 ppid=2893 pid=6354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:53.004705 kernel: audit: type=1325 audit(1707472672.846:1440): table=filter:141 family=2 entries=6 op=nft_register_rule pid=6354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:53.004781 kernel: audit: type=1300 audit(1707472672.846:1440): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fffc281baa0 a2=0 a3=7fffc281ba8c items=0 ppid=2893 pid=6354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:53.004799 kernel: audit: type=1327 audit(1707472672.846:1440): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:52.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:53.021175 env[1477]: time="2024-02-09T09:57:53.021138296Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:53.021862 env[1477]: time="2024-02-09T09:57:53.021848751Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:53.022535 env[1477]: time="2024-02-09T09:57:53.022523382Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:53.023254 env[1477]: time="2024-02-09T09:57:53.023242442Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:53.023409 env[1477]: time="2024-02-09T09:57:53.023396993Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 09:57:53.024178 env[1477]: time="2024-02-09T09:57:53.024164720Z" level=info msg="CreateContainer within sandbox \"36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 09:57:53.064847 env[1477]: time="2024-02-09T09:57:53.064831046Z" level=info msg="CreateContainer within sandbox \"36d35704e9ce78fb91755703f5e2ff730fa2d4477e537691eb0808363faf28f1\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"792c20b5fc657d5c642c026db66e9f4389877231a177a69746e5bade97d65882\"" Feb 9 09:57:53.065060 env[1477]: time="2024-02-09T09:57:53.065041550Z" level=info msg="StartContainer for \"792c20b5fc657d5c642c026db66e9f4389877231a177a69746e5bade97d65882\"" Feb 9 09:57:52.847000 audit[6354]: NETFILTER_CFG table=nat:142 family=2 entries=92 op=nft_register_chain pid=6354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:53.074791 systemd[1]: Started cri-containerd-792c20b5fc657d5c642c026db66e9f4389877231a177a69746e5bade97d65882.scope. Feb 9 09:57:52.847000 audit[6354]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7fffc281baa0 a2=0 a3=7fffc281ba8c items=0 ppid=2893 pid=6354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:52.847000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:53.080000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.080000 audit[6362]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4729 pid=6362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:53.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739326332306235666336353764356336343263303236646236366539 Feb 9 09:57:53.080000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.080000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.132569 kernel: audit: type=1325 audit(1707472672.847:1441): table=nat:142 family=2 entries=92 op=nft_register_chain pid=6354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:53.080000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.080000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.080000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.080000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.080000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.080000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.080000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.080000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.080000 audit: BPF prog-id=199 op=LOAD Feb 9 09:57:53.080000 audit[6362]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003ca320 items=0 ppid=4729 pid=6362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:53.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739326332306235666336353764356336343263303236646236366539 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit: BPF prog-id=200 op=LOAD Feb 9 09:57:53.131000 audit[6362]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ca368 items=0 ppid=4729 pid=6362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:53.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739326332306235666336353764356336343263303236646236366539 Feb 9 09:57:53.131000 audit: BPF prog-id=200 op=UNLOAD Feb 9 09:57:53.131000 audit: BPF prog-id=199 op=UNLOAD Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { perfmon } for pid=6362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit[6362]: AVC avc: denied { bpf } for pid=6362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:53.131000 audit: BPF prog-id=201 op=LOAD Feb 9 09:57:53.131000 audit[6362]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ca3f8 items=0 ppid=4729 pid=6362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:53.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739326332306235666336353764356336343263303236646236366539 Feb 9 09:57:53.138687 env[1477]: time="2024-02-09T09:57:53.138666294Z" level=info msg="StartContainer for \"792c20b5fc657d5c642c026db66e9f4389877231a177a69746e5bade97d65882\" returns successfully" Feb 9 09:57:53.645923 kubelet[2599]: I0209 09:57:53.645826 2599 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 09:57:53.645923 kubelet[2599]: I0209 09:57:53.645930 2599 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 09:57:53.986230 kubelet[2599]: I0209 09:57:53.986134 2599 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-hp56n" podStartSLOduration=-9.2233719238687e+09 pod.CreationTimestamp="2024-02-09 09:56:01 +0000 UTC" firstStartedPulling="2024-02-09 09:57:07.792187882 +0000 UTC m=+85.302525045" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:57:53.985733398 +0000 UTC m=+131.496070558" watchObservedRunningTime="2024-02-09 09:57:53.986076047 +0000 UTC m=+131.496413211" Feb 9 09:58:38.750000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:38.778923 kernel: kauditd_printk_skb: 45 callbacks suppressed Feb 9 09:58:38.778984 kernel: audit: type=1400 audit(1707472718.750:1448): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:38.750000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00191bde0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:58:38.992027 kernel: audit: type=1300 audit(1707472718.750:1448): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00191bde0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:58:38.992074 kernel: audit: type=1327 audit(1707472718.750:1448): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:38.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:38.750000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:39.177355 kernel: audit: type=1400 audit(1707472718.750:1449): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:39.177393 kernel: audit: type=1300 audit(1707472718.750:1449): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a8c060 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:58:38.750000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a8c060 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:58:39.298262 kernel: audit: type=1327 audit(1707472718.750:1449): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:38.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:39.391684 kernel: audit: type=1400 audit(1707472718.806:1450): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:38.806000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:39.483410 kernel: audit: type=1300 audit(1707472718.806:1450): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0067d7740 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:58:38.806000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0067d7740 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:58:39.582288 kernel: audit: type=1327 audit(1707472718.806:1450): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:58:38.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:58:39.676364 kernel: audit: type=1400 audit(1707472718.806:1451): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:38.806000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:38.806000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00de10fc0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:58:38.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:58:38.806000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:38.806000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0067d7770 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:58:38.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:58:38.806000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:38.806000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003aa2ab0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:58:38.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:58:38.808000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:38.808000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003bc37a0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:58:38.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:58:38.819000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:38.819000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0144699b0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:58:38.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:58:42.794000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:42.794000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:42.794000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000087f40 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:58:42.794000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000114d80 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:58:42.794000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:42.794000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:42.795000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:42.795000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000eae960 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:58:42.795000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:42.795000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:42.795000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c001787700 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:58:42.795000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:48.053000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 09:58:48.082111 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 09:58:48.082197 kernel: audit: type=1400 audit(1707472728.053:1460): avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 09:58:48.053000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d10d60 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 09:58:48.274701 kernel: audit: type=1300 audit(1707472728.053:1460): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d10d60 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 09:58:48.274752 kernel: audit: type=1327 audit(1707472728.053:1460): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:58:48.053000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:58:48.367869 kernel: audit: type=1400 audit(1707472728.124:1461): avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 09:58:48.124000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 09:58:48.462644 kernel: audit: type=1300 audit(1707472728.124:1461): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00186fbc0 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 09:58:48.124000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00186fbc0 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 09:58:48.560131 kernel: audit: type=1327 audit(1707472728.124:1461): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:58:48.124000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:58:55.799769 systemd[1]: Started sshd@7-139.178.90.113:22-170.64.196.239:37874.service. Feb 9 09:58:55.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.113:22-170.64.196.239:37874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:55.889561 kernel: audit: type=1130 audit(1707472735.799:1462): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.113:22-170.64.196.239:37874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:56.411463 sshd[6627]: Invalid user sdn from 170.64.196.239 port 37874 Feb 9 09:58:56.565991 sshd[6627]: pam_faillock(sshd:auth): User unknown Feb 9 09:58:56.567109 sshd[6627]: pam_unix(sshd:auth): check pass; user unknown Feb 9 09:58:56.567261 sshd[6627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.196.239 Feb 9 09:58:56.568314 sshd[6627]: pam_faillock(sshd:auth): User unknown Feb 9 09:58:56.567000 audit[6627]: USER_AUTH pid=6627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sdn" exe="/usr/sbin/sshd" hostname=170.64.196.239 addr=170.64.196.239 terminal=ssh res=failed' Feb 9 09:58:56.660634 kernel: audit: type=1100 audit(1707472736.567:1463): pid=6627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sdn" exe="/usr/sbin/sshd" hostname=170.64.196.239 addr=170.64.196.239 terminal=ssh res=failed' Feb 9 09:58:58.395835 sshd[6627]: Failed password for invalid user sdn from 170.64.196.239 port 37874 ssh2 Feb 9 09:58:58.926251 sshd[6627]: Connection closed by invalid user sdn 170.64.196.239 port 37874 [preauth] Feb 9 09:58:58.928812 systemd[1]: sshd@7-139.178.90.113:22-170.64.196.239:37874.service: Deactivated successfully. Feb 9 09:58:58.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.113:22-170.64.196.239:37874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:59.021739 kernel: audit: type=1131 audit(1707472738.928:1464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.113:22-170.64.196.239:37874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:38.751000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:38.751000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017399b0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:59:38.968090 kernel: audit: type=1400 audit(1707472778.751:1465): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:38.968134 kernel: audit: type=1300 audit(1707472778.751:1465): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017399b0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:59:38.968151 kernel: audit: type=1327 audit(1707472778.751:1465): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:38.751000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:39.061559 kernel: audit: type=1400 audit(1707472778.751:1466): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:38.751000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:39.151772 kernel: audit: type=1300 audit(1707472778.751:1466): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002ade4c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:59:38.751000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002ade4c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:59:39.272337 kernel: audit: type=1327 audit(1707472778.751:1466): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:38.751000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:39.365915 kernel: audit: type=1400 audit(1707472778.806:1467): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:38.806000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:39.456960 kernel: audit: type=1300 audit(1707472778.806:1467): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01174ed40 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:59:38.806000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01174ed40 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:59:39.556212 kernel: audit: type=1327 audit(1707472778.806:1467): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:59:38.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:59:39.650506 kernel: audit: type=1400 audit(1707472778.806:1468): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:38.806000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:38.806000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:38.806000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c012d50e70 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:59:38.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:59:38.806000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c013609230 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:59:38.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:59:38.806000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:38.806000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0134996b0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:59:38.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:59:38.808000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:38.808000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f3ed120 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:59:38.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:59:38.820000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:38.820000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c013499710 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 09:59:38.820000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 09:59:42.794000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:42.794000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027e4fe0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:59:42.794000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:42.794000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:42.794000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0027e5000 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:59:42.794000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:42.794000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:42.794000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002adef00 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:59:42.794000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:42.795000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:42.795000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001d4be60 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 09:59:42.795000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:48.054000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 09:59:48.082470 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 09:59:48.082536 kernel: audit: type=1400 audit(1707472788.054:1477): avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 09:59:48.054000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00211e180 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 09:59:48.276247 kernel: audit: type=1300 audit(1707472788.054:1477): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00211e180 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 09:59:48.276317 kernel: audit: type=1327 audit(1707472788.054:1477): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:59:48.054000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:59:48.125000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 09:59:48.466396 kernel: audit: type=1400 audit(1707472788.125:1478): avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 09:59:48.466431 kernel: audit: type=1300 audit(1707472788.125:1478): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000db0000 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 09:59:48.125000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000db0000 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 09:59:48.564053 kernel: audit: type=1327 audit(1707472788.125:1478): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:59:48.125000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:00:38.751000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:38.751000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010771d0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:00:38.968116 kernel: audit: type=1400 audit(1707472838.751:1479): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:38.968207 kernel: audit: type=1300 audit(1707472838.751:1479): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010771d0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:00:38.968230 kernel: audit: type=1327 audit(1707472838.751:1479): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:38.751000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:38.751000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:39.151574 kernel: audit: type=1400 audit(1707472838.751:1480): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:39.151658 kernel: audit: type=1300 audit(1707472838.751:1480): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0006ac620 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:00:38.751000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0006ac620 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:00:39.273769 kernel: audit: type=1327 audit(1707472838.751:1480): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:38.751000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:39.366977 kernel: audit: type=1400 audit(1707472838.807:1481): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:38.807000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:39.457596 kernel: audit: type=1300 audit(1707472838.807:1481): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01197a5d0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:00:38.807000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01197a5d0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:00:39.555938 kernel: audit: type=1327 audit(1707472838.807:1481): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:00:38.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:00:39.649308 kernel: audit: type=1400 audit(1707472838.807:1482): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:38.807000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:38.807000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c012215290 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:00:38.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:00:38.807000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:38.807000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01197a630 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:00:38.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:00:38.807000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:38.807000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003b19160 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:00:38.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:00:38.809000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:38.809000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00b288fe0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:00:38.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:00:38.820000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:38.820000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c015d0ade0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:00:38.820000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:00:42.796000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:42.796000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003009880 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:00:42.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:42.796000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:42.796000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00248c4c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:00:42.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:42.796000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:42.796000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0015a54e0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:00:42.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:42.796000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:42.796000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002d2cea0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:00:42.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:48.054000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:00:48.082809 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 10:00:48.082866 kernel: audit: type=1400 audit(1707472848.054:1491): avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:00:48.054000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000809e00 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:00:48.276523 kernel: audit: type=1300 audit(1707472848.054:1491): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000809e00 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:00:48.276566 kernel: audit: type=1327 audit(1707472848.054:1491): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:00:48.054000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:00:48.126000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:00:48.463836 kernel: audit: type=1400 audit(1707472848.126:1492): avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:00:48.463877 kernel: audit: type=1300 audit(1707472848.126:1492): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012b75e0 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:00:48.126000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012b75e0 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:00:48.126000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:00:48.653489 kernel: audit: type=1327 audit(1707472848.126:1492): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:01:38.751000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:38.751000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a8d350 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:01:38.970110 kernel: audit: type=1400 audit(1707472898.751:1493): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:38.970194 kernel: audit: type=1300 audit(1707472898.751:1493): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a8d350 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:01:38.970241 kernel: audit: type=1327 audit(1707472898.751:1493): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:38.751000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:38.752000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:39.153360 kernel: audit: type=1400 audit(1707472898.752:1494): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:39.153419 kernel: audit: type=1300 audit(1707472898.752:1494): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002687b20 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:01:38.752000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002687b20 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:01:38.752000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:39.367023 kernel: audit: type=1327 audit(1707472898.752:1494): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:39.367079 kernel: audit: type=1400 audit(1707472898.807:1495): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:38.807000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:38.807000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c011facba0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:01:39.556134 kernel: audit: type=1300 audit(1707472898.807:1495): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c011facba0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:01:39.556198 kernel: audit: type=1327 audit(1707472898.807:1495): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:01:38.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:01:38.807000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:39.742092 kernel: audit: type=1400 audit(1707472898.807:1496): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:38.807000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0082f75c0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:01:38.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:01:38.807000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:38.807000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0090c15a0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:01:38.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:01:38.807000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:38.807000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0055d9f50 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:01:38.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:01:38.809000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:38.809000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002da46c0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:01:38.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:01:38.820000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:38.820000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0082f7710 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:01:38.820000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:01:42.796000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:42.796000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012f8940 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:01:42.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:42.796000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:42.796000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002687c00 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:01:42.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:42.796000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:42.796000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024d65c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:01:42.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:42.796000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:42.796000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c0006b8620 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:01:42.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:48.055000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:01:48.084362 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 10:01:48.084417 kernel: audit: type=1400 audit(1707472908.055:1505): avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:01:48.055000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00192d1e0 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:01:48.278635 kernel: audit: type=1300 audit(1707472908.055:1505): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00192d1e0 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:01:48.278684 kernel: audit: type=1327 audit(1707472908.055:1505): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:01:48.055000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:01:48.126000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:01:48.466195 kernel: audit: type=1400 audit(1707472908.126:1506): avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:01:48.466226 kernel: audit: type=1300 audit(1707472908.126:1506): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c8ad20 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:01:48.126000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c8ad20 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:01:48.126000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:01:48.656146 kernel: audit: type=1327 audit(1707472908.126:1506): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:02:38.753000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:38.753000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002582c80 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:02:38.970267 kernel: audit: type=1400 audit(1707472958.753:1507): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:38.970342 kernel: audit: type=1300 audit(1707472958.753:1507): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002582c80 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:02:38.970363 kernel: audit: type=1327 audit(1707472958.753:1507): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:02:38.753000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:02:39.063620 kernel: audit: type=1400 audit(1707472958.753:1508): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:38.753000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:39.154784 kernel: audit: type=1300 audit(1707472958.753:1508): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e892c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:02:38.753000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e892c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:02:39.275161 kernel: audit: type=1327 audit(1707472958.753:1508): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:02:38.753000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:02:38.808000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:39.459017 kernel: audit: type=1400 audit(1707472958.808:1509): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:39.459051 kernel: audit: type=1300 audit(1707472958.808:1509): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c005361800 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:02:38.808000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c005361800 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:02:38.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:02:39.650878 kernel: audit: type=1327 audit(1707472958.808:1509): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:02:39.650911 kernel: audit: type=1400 audit(1707472958.808:1510): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:38.808000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:38.808000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c001d331e0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:02:38.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:02:38.808000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:38.808000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c005361890 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:02:38.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:02:38.808000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:38.808000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c013843860 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:02:38.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:02:38.810000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:38.810000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0038cf460 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:02:38.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:02:38.821000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:38.821000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00841fa10 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:02:38.821000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:02:42.798000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:42.798000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002583200 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:02:42.798000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:02:42.798000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:42.798000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002583220 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:02:42.798000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:02:42.798000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:42.798000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024d7b00 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:02:42.798000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:02:42.798000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:42.798000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c001d4ad40 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:02:42.798000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:02:48.056000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:02:48.085218 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 10:02:48.085277 kernel: audit: type=1400 audit(1707472968.056:1519): avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:02:48.056000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00192dd80 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:02:48.279567 kernel: audit: type=1300 audit(1707472968.056:1519): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00192dd80 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:02:48.279603 kernel: audit: type=1327 audit(1707472968.056:1519): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:02:48.056000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:02:48.373121 kernel: audit: type=1400 audit(1707472968.127:1520): avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:02:48.127000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:02:48.467936 kernel: audit: type=1300 audit(1707472968.127:1520): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e88040 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:02:48.127000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e88040 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:02:48.127000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:02:48.659333 kernel: audit: type=1327 audit(1707472968.127:1520): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:03:38.753000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:38.753000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d5fbe0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:03:38.970203 kernel: audit: type=1400 audit(1707473018.753:1521): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:38.970244 kernel: audit: type=1300 audit(1707473018.753:1521): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d5fbe0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:03:38.970262 kernel: audit: type=1327 audit(1707473018.753:1521): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:03:38.753000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:03:39.063528 kernel: audit: type=1400 audit(1707473018.753:1522): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:38.753000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:39.154762 kernel: audit: type=1300 audit(1707473018.753:1522): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00248b620 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:03:38.753000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00248b620 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:03:39.275295 kernel: audit: type=1327 audit(1707473018.753:1522): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:03:38.753000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:03:39.368570 kernel: audit: type=1400 audit(1707473018.807:1523): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:38.807000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:39.458628 kernel: audit: type=1300 audit(1707473018.807:1523): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003bea1c0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:03:38.807000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003bea1c0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:03:39.556994 kernel: audit: type=1327 audit(1707473018.807:1523): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:03:38.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:03:39.650410 kernel: audit: type=1400 audit(1707473018.808:1524): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:38.808000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:38.808000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c013482bd0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:03:38.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:03:38.808000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:38.808000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c01428cde0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:03:38.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:03:38.808000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:38.808000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c011c38c00 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:03:38.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:03:38.810000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:38.810000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002cfd180 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:03:38.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:03:38.820000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:38.820000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00887a870 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:03:38.820000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:03:42.797000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:42.797000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d5fd20 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:03:42.797000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:03:42.797000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:42.797000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000d8aac0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:03:42.797000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:03:42.798000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:42.798000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d8ab00 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:03:42.798000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:03:42.798000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:03:42.798000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c00248e340 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:03:42.798000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:03:48.057000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:03:48.085272 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 10:03:48.085348 kernel: audit: type=1400 audit(1707473028.057:1533): avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:03:48.057000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bea2c0 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:03:48.279447 kernel: audit: type=1300 audit(1707473028.057:1533): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bea2c0 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:03:48.279482 kernel: audit: type=1327 audit(1707473028.057:1533): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:03:48.057000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:03:48.372724 kernel: audit: type=1400 audit(1707473028.128:1534): avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:03:48.128000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:03:48.467039 kernel: audit: type=1300 audit(1707473028.128:1534): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e89a20 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:03:48.128000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e89a20 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:03:48.563642 kernel: audit: type=1327 audit(1707473028.128:1534): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:03:48.128000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:04:38.755000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:38.755000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c78de0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:04:38.969458 kernel: audit: type=1400 audit(1707473078.755:1535): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:38.969522 kernel: audit: type=1300 audit(1707473078.755:1535): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c78de0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:04:38.969541 kernel: audit: type=1327 audit(1707473078.755:1535): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:04:38.755000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:04:38.755000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:39.153079 kernel: audit: type=1400 audit(1707473078.755:1536): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:39.153113 kernel: audit: type=1300 audit(1707473078.755:1536): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00248f320 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:04:38.755000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00248f320 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:04:38.755000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:04:39.366882 kernel: audit: type=1327 audit(1707473078.755:1536): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:04:39.366927 kernel: audit: type=1400 audit(1707473078.809:1537): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:38.809000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:39.457985 kernel: audit: type=1300 audit(1707473078.809:1537): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c010d4d140 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:04:38.809000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c010d4d140 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:04:39.556329 kernel: audit: type=1327 audit(1707473078.809:1537): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:04:38.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:04:38.809000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:39.741982 kernel: audit: type=1400 audit(1707473078.809:1538): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:38.809000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c007716660 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:04:38.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:04:38.809000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:38.809000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002e41c00 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:04:38.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:04:38.809000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:38.809000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0077bfaa0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:04:38.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:04:38.811000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:38.811000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002e61160 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:04:38.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:04:38.822000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:38.822000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c010d4d290 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:04:38.822000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:04:42.799000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:42.799000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001d4ada0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:04:42.799000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:04:42.799000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:42.799000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00248fd00 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:04:42.799000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:04:42.799000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:42.799000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002875f60 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:04:42.799000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:04:42.799000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:04:42.799000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0006b8a60 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:04:42.799000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:04:48.056000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:04:48.085825 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 10:04:48.085893 kernel: audit: type=1400 audit(1707473088.056:1547): avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:04:48.056000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001972600 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:04:48.279549 kernel: audit: type=1300 audit(1707473088.056:1547): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001972600 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:04:48.279584 kernel: audit: type=1327 audit(1707473088.056:1547): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:04:48.056000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:04:48.372819 kernel: audit: type=1400 audit(1707473088.128:1548): avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:04:48.128000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:04:48.468867 kernel: audit: type=1300 audit(1707473088.128:1548): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001238d20 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:04:48.128000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001238d20 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:04:48.567391 kernel: audit: type=1327 audit(1707473088.128:1548): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:04:48.128000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:05:00.014373 systemd[1]: Started sshd@8-139.178.90.113:22-218.92.0.26:65286.service. Feb 9 10:05:00.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.113:22-218.92.0.26:65286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:00.105648 kernel: audit: type=1130 audit(1707473100.012:1549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.113:22-218.92.0.26:65286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:00.178906 sshd[7900]: Unable to negotiate with 218.92.0.26 port 65286: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 10:05:00.180837 systemd[1]: sshd@8-139.178.90.113:22-218.92.0.26:65286.service: Deactivated successfully. Feb 9 10:05:00.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.113:22-218.92.0.26:65286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:00.276625 kernel: audit: type=1131 audit(1707473100.179:1550): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.113:22-218.92.0.26:65286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:09.520599 systemd[1]: Started sshd@9-139.178.90.113:22-61.177.172.179:25693.service. Feb 9 10:05:09.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.113:22-61.177.172.179:25693 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:09.610610 kernel: audit: type=1130 audit(1707473109.520:1551): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.113:22-61.177.172.179:25693 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:11.866885 update_engine[1467]: I0209 10:05:11.866777 1467 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 10:05:11.866885 update_engine[1467]: I0209 10:05:11.866850 1467 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 10:05:11.868812 update_engine[1467]: I0209 10:05:11.868733 1467 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 10:05:11.869741 update_engine[1467]: I0209 10:05:11.869658 1467 omaha_request_params.cc:62] Current group set to lts Feb 9 10:05:11.869968 update_engine[1467]: I0209 10:05:11.869936 1467 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 10:05:11.869968 update_engine[1467]: I0209 10:05:11.869957 1467 update_attempter.cc:643] Scheduling an action processor start. Feb 9 10:05:11.870184 update_engine[1467]: I0209 10:05:11.869992 1467 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 10:05:11.870184 update_engine[1467]: I0209 10:05:11.870060 1467 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 10:05:11.870371 update_engine[1467]: I0209 10:05:11.870211 1467 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 10:05:11.870371 update_engine[1467]: I0209 10:05:11.870229 1467 omaha_request_action.cc:271] Request: Feb 9 10:05:11.870371 update_engine[1467]: Feb 9 10:05:11.870371 update_engine[1467]: Feb 9 10:05:11.870371 update_engine[1467]: Feb 9 10:05:11.870371 update_engine[1467]: Feb 9 10:05:11.870371 update_engine[1467]: Feb 9 10:05:11.870371 update_engine[1467]: Feb 9 10:05:11.870371 update_engine[1467]: Feb 9 10:05:11.870371 update_engine[1467]: Feb 9 10:05:11.870371 update_engine[1467]: I0209 10:05:11.870239 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:05:11.871411 locksmithd[1513]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 10:05:11.873505 update_engine[1467]: I0209 10:05:11.873456 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:05:11.873757 update_engine[1467]: E0209 10:05:11.873694 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:05:11.873931 update_engine[1467]: I0209 10:05:11.873849 1467 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 10:05:21.825046 update_engine[1467]: I0209 10:05:21.824925 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:05:21.825979 update_engine[1467]: I0209 10:05:21.825374 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:05:21.825979 update_engine[1467]: E0209 10:05:21.825610 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:05:21.825979 update_engine[1467]: I0209 10:05:21.825781 1467 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 10:05:31.825040 update_engine[1467]: I0209 10:05:31.824918 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:05:31.826042 update_engine[1467]: I0209 10:05:31.825387 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:05:31.826042 update_engine[1467]: E0209 10:05:31.825616 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:05:31.826042 update_engine[1467]: I0209 10:05:31.825796 1467 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 10:05:38.756000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:38.756000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f12120 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:05:38.970753 kernel: audit: type=1400 audit(1707473138.756:1552): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:38.970821 kernel: audit: type=1300 audit(1707473138.756:1552): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f12120 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:05:38.970840 kernel: audit: type=1327 audit(1707473138.756:1552): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:05:38.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:05:38.756000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:39.155639 kernel: audit: type=1400 audit(1707473138.756:1553): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:39.155676 kernel: audit: type=1300 audit(1707473138.756:1553): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00064df80 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:05:38.756000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00064df80 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:05:39.276188 kernel: audit: type=1327 audit(1707473138.756:1553): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:05:38.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:05:39.369786 kernel: audit: type=1400 audit(1707473138.810:1554): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:38.810000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:38.810000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0135337d0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:05:39.561572 kernel: audit: type=1300 audit(1707473138.810:1554): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0135337d0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:05:39.561608 kernel: audit: type=1327 audit(1707473138.810:1554): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:05:38.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:05:39.655633 kernel: audit: type=1400 audit(1707473138.810:1555): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:38.810000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:38.810000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0158d5cb0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:05:38.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:05:38.810000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:38.810000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0158d5ce0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:05:38.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:05:38.810000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:38.810000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0117ccce0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:05:38.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:05:38.812000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:38.812000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00375df80 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:05:38.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:05:38.823000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:38.823000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c012872a20 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:05:38.823000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:05:40.015385 systemd[1]: Started sshd@10-139.178.90.113:22-170.64.196.239:47390.service. Feb 9 10:05:40.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.113:22-170.64.196.239:47390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:40.620526 sshd[8036]: Invalid user sdc from 170.64.196.239 port 47390 Feb 9 10:05:40.771334 sshd[8036]: pam_faillock(sshd:auth): User unknown Feb 9 10:05:40.772488 sshd[8036]: pam_unix(sshd:auth): check pass; user unknown Feb 9 10:05:40.772609 sshd[8036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.196.239 Feb 9 10:05:40.773712 sshd[8036]: pam_faillock(sshd:auth): User unknown Feb 9 10:05:40.773000 audit[8036]: USER_AUTH pid=8036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sdc" exe="/usr/sbin/sshd" hostname=170.64.196.239 addr=170.64.196.239 terminal=ssh res=failed' Feb 9 10:05:41.824843 update_engine[1467]: I0209 10:05:41.824635 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:05:41.826039 update_engine[1467]: I0209 10:05:41.825066 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:05:41.826039 update_engine[1467]: E0209 10:05:41.825269 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:05:41.826039 update_engine[1467]: I0209 10:05:41.825413 1467 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 10:05:41.826039 update_engine[1467]: I0209 10:05:41.825428 1467 omaha_request_action.cc:621] Omaha request response: Feb 9 10:05:41.826039 update_engine[1467]: E0209 10:05:41.825599 1467 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 10:05:41.826039 update_engine[1467]: I0209 10:05:41.825628 1467 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 10:05:41.826039 update_engine[1467]: I0209 10:05:41.825639 1467 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 10:05:41.826039 update_engine[1467]: I0209 10:05:41.825646 1467 update_attempter.cc:306] Processing Done. Feb 9 10:05:41.826039 update_engine[1467]: E0209 10:05:41.825672 1467 update_attempter.cc:619] Update failed. Feb 9 10:05:41.826039 update_engine[1467]: I0209 10:05:41.825681 1467 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 10:05:41.826039 update_engine[1467]: I0209 10:05:41.825691 1467 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 10:05:41.826039 update_engine[1467]: I0209 10:05:41.825700 1467 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 10:05:41.826039 update_engine[1467]: I0209 10:05:41.825851 1467 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 10:05:41.826039 update_engine[1467]: I0209 10:05:41.825903 1467 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 10:05:41.826039 update_engine[1467]: I0209 10:05:41.825913 1467 omaha_request_action.cc:271] Request: Feb 9 10:05:41.826039 update_engine[1467]: Feb 9 10:05:41.826039 update_engine[1467]: Feb 9 10:05:41.827748 update_engine[1467]: Feb 9 10:05:41.827748 update_engine[1467]: Feb 9 10:05:41.827748 update_engine[1467]: Feb 9 10:05:41.827748 update_engine[1467]: Feb 9 10:05:41.827748 update_engine[1467]: I0209 10:05:41.825922 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:05:41.827748 update_engine[1467]: I0209 10:05:41.826220 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:05:41.827748 update_engine[1467]: E0209 10:05:41.826409 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:05:41.827748 update_engine[1467]: I0209 10:05:41.826579 1467 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 10:05:41.827748 update_engine[1467]: I0209 10:05:41.826596 1467 omaha_request_action.cc:621] Omaha request response: Feb 9 10:05:41.827748 update_engine[1467]: I0209 10:05:41.826607 1467 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 10:05:41.827748 update_engine[1467]: I0209 10:05:41.826614 1467 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 10:05:41.827748 update_engine[1467]: I0209 10:05:41.826622 1467 update_attempter.cc:306] Processing Done. Feb 9 10:05:41.827748 update_engine[1467]: I0209 10:05:41.826629 1467 update_attempter.cc:310] Error event sent. Feb 9 10:05:41.827748 update_engine[1467]: I0209 10:05:41.826649 1467 update_check_scheduler.cc:74] Next update check in 48m21s Feb 9 10:05:41.829067 locksmithd[1513]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 10:05:41.829067 locksmithd[1513]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 10:05:42.800000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:42.800000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002dc6200 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:05:42.800000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:05:42.800000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:42.800000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002f122a0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:05:42.800000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:05:42.800000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:42.800000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c002dc6220 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:05:42.800000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:05:42.801000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:42.801000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f122c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:05:42.801000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:05:43.062959 sshd[8036]: Failed password for invalid user sdc from 170.64.196.239 port 47390 ssh2 Feb 9 10:05:44.416843 sshd[8036]: Connection closed by invalid user sdc 170.64.196.239 port 47390 [preauth] Feb 9 10:05:44.419471 systemd[1]: sshd@10-139.178.90.113:22-170.64.196.239:47390.service: Deactivated successfully. Feb 9 10:05:44.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.113:22-170.64.196.239:47390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:44.447266 kernel: kauditd_printk_skb: 28 callbacks suppressed Feb 9 10:05:44.447311 kernel: audit: type=1131 audit(1707473144.419:1566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.113:22-170.64.196.239:47390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:48.058000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:05:48.058000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001dc5760 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:05:48.255374 kernel: audit: type=1400 audit(1707473148.058:1567): avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:05:48.255414 kernel: audit: type=1300 audit(1707473148.058:1567): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001dc5760 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:05:48.255434 kernel: audit: type=1327 audit(1707473148.058:1567): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:05:48.058000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:05:48.348711 kernel: audit: type=1400 audit(1707473148.129:1568): avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:05:48.129000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:05:48.443102 kernel: audit: type=1300 audit(1707473148.129:1568): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00183e900 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:05:48.129000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00183e900 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:05:48.539804 kernel: audit: type=1327 audit(1707473148.129:1568): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:05:48.129000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:06:38.756000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:38.756000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002874fc0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:06:38.975467 kernel: audit: type=1400 audit(1707473198.756:1569): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:38.975511 kernel: audit: type=1300 audit(1707473198.756:1569): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002874fc0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:06:38.975531 kernel: audit: type=1327 audit(1707473198.756:1569): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:06:38.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:06:39.068739 kernel: audit: type=1400 audit(1707473198.756:1570): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:38.756000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:39.160037 kernel: audit: type=1300 audit(1707473198.756:1570): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020f35f0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:06:38.756000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020f35f0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:06:38.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:06:39.373912 kernel: audit: type=1327 audit(1707473198.756:1570): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:06:39.373946 kernel: audit: type=1400 audit(1707473198.811:1571): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:38.811000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:39.464270 kernel: audit: type=1300 audit(1707473198.811:1571): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c010389b80 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:06:38.811000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c010389b80 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:06:39.563914 kernel: audit: type=1327 audit(1707473198.811:1571): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:06:38.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:06:39.659477 kernel: audit: type=1400 audit(1707473198.811:1572): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:38.811000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:38.811000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0121e3530 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:06:38.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:06:38.811000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:38.811000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01428d290 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:06:38.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:06:38.811000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:38.811000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0123d2360 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:06:38.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:06:38.813000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:38.813000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c010389ca0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:06:38.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:06:38.824000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:38.824000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0123d2390 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:06:38.824000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:06:42.801000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:42.801000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003009160 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:06:42.801000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:06:42.801000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:42.801000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001d4a780 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:06:42.801000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:06:42.802000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:42.802000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003009180 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:06:42.802000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:06:42.802000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:42.802000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c002874fe0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:06:42.802000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:06:48.060000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:06:48.087931 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 10:06:48.087997 kernel: audit: type=1400 audit(1707473208.060:1581): avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:06:48.060000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b7a9e0 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:06:48.184559 kernel: audit: type=1300 audit(1707473208.060:1581): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b7a9e0 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:06:48.060000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:06:48.375758 kernel: audit: type=1327 audit(1707473208.060:1581): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:06:48.375816 kernel: audit: type=1400 audit(1707473208.130:1582): avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:06:48.130000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:06:48.471516 kernel: audit: type=1300 audit(1707473208.130:1582): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00175a660 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:06:48.130000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00175a660 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:06:48.568118 kernel: audit: type=1327 audit(1707473208.130:1582): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:06:48.130000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:07:09.527661 sshd[7921]: Timeout before authentication for 61.177.172.179 port 25693 Feb 9 10:07:09.529103 systemd[1]: sshd@9-139.178.90.113:22-61.177.172.179:25693.service: Deactivated successfully. Feb 9 10:07:09.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.113:22-61.177.172.179:25693 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.620651 kernel: audit: type=1131 audit(1707473229.528:1583): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.113:22-61.177.172.179:25693 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:38.755000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:38.755000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00248c600 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:07:38.973887 kernel: audit: type=1400 audit(1707473258.755:1584): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:38.973940 kernel: audit: type=1300 audit(1707473258.755:1584): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00248c600 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:07:38.973960 kernel: audit: type=1327 audit(1707473258.755:1584): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:38.755000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:39.067220 kernel: audit: type=1400 audit(1707473258.756:1585): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:38.756000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:39.158474 kernel: audit: type=1300 audit(1707473258.756:1585): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b8ca80 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:07:38.756000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b8ca80 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:07:38.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:39.279642 kernel: audit: type=1327 audit(1707473258.756:1585): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:38.810000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:39.372614 kernel: audit: type=1400 audit(1707473258.810:1586): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:38.810000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c006443260 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:07:39.563824 kernel: audit: type=1300 audit(1707473258.810:1586): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c006443260 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:07:39.563854 kernel: audit: type=1327 audit(1707473258.810:1586): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:07:38.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:07:39.658809 kernel: audit: type=1400 audit(1707473258.810:1587): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:38.810000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:38.810000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0064432c0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:07:38.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:07:38.810000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:38.810000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0077bed80 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:07:38.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:07:38.810000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:38.810000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003beb920 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:07:38.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:07:38.813000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:38.813000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002e61ea0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:07:38.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:07:38.824000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:38.824000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c005d84d80 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:07:38.824000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:07:42.801000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:42.801000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ba1e00 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:07:42.801000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:42.801000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:42.801000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00248c840 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:07:42.801000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:42.801000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:42.801000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f23560 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:07:42.801000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:42.802000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:42.802000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c000086880 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:07:42.802000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:48.061000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:07:48.089616 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 10:07:48.089696 kernel: audit: type=1400 audit(1707473268.061:1596): avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:07:48.061000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00181a020 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:07:48.284153 kernel: audit: type=1300 audit(1707473268.061:1596): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00181a020 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:07:48.284193 kernel: audit: type=1327 audit(1707473268.061:1596): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:07:48.061000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:07:48.377274 kernel: audit: type=1400 audit(1707473268.131:1597): avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:07:48.131000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:07:48.131000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00174b140 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:07:48.472563 kernel: audit: type=1300 audit(1707473268.131:1597): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00174b140 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:07:48.131000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:07:48.661318 kernel: audit: type=1327 audit(1707473268.131:1597): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:08:38.757000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:38.757000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026a4e40 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:08:38.975494 kernel: audit: type=1400 audit(1707473318.757:1598): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:38.975535 kernel: audit: type=1300 audit(1707473318.757:1598): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026a4e40 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:08:38.975561 kernel: audit: type=1327 audit(1707473318.757:1598): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:38.757000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:39.068639 kernel: audit: type=1400 audit(1707473318.757:1599): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:38.757000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:39.158686 kernel: audit: type=1300 audit(1707473318.757:1599): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001743fc0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:08:38.757000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001743fc0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:08:39.279032 kernel: audit: type=1327 audit(1707473318.757:1599): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:38.757000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:39.372306 kernel: audit: type=1400 audit(1707473318.811:1600): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:38.811000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:39.463025 kernel: audit: type=1300 audit(1707473318.811:1600): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c011df3440 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:08:38.811000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c011df3440 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:08:39.561484 kernel: audit: type=1327 audit(1707473318.811:1600): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:08:38.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:08:39.654974 kernel: audit: type=1400 audit(1707473318.811:1601): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:38.811000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:38.811000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0158d4ba0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:08:38.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:08:38.811000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:38.811000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0158d4bd0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:08:38.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:08:38.811000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:38.811000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002d8dd00 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:08:38.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:08:38.814000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:38.814000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0115c7a80 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:08:38.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:08:38.824000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:38.824000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c013509f50 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:08:38.824000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:08:42.803000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:42.803000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012f9380 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:08:42.803000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:42.803000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:42.803000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002d5f3e0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:08:42.803000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:42.803000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:42.803000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002f12240 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:08:42.803000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:42.803000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:42.803000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d5f400 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:08:42.803000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:48.062000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:08:48.187817 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 10:08:48.187900 kernel: audit: type=1400 audit(1707473328.062:1610): avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:08:48.187918 kernel: audit: type=1300 audit(1707473328.062:1610): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019901e0 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:08:48.062000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019901e0 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:08:48.285714 kernel: audit: type=1327 audit(1707473328.062:1610): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:08:48.062000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:08:48.378991 kernel: audit: type=1400 audit(1707473328.132:1611): avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:08:48.132000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:08:48.473244 kernel: audit: type=1300 audit(1707473328.132:1611): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0018c0640 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:08:48.132000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0018c0640 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:08:48.569844 kernel: audit: type=1327 audit(1707473328.132:1611): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:08:48.132000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:09:27.568998 systemd[1]: Started sshd@11-139.178.90.113:22-147.75.109.163:45792.service. Feb 9 10:09:27.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.113:22-147.75.109.163:45792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:27.661566 kernel: audit: type=1130 audit(1707473367.567:1612): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.113:22-147.75.109.163:45792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:27.693000 audit[8862]: USER_ACCT pid=8862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:27.694067 sshd[8862]: Accepted publickey for core from 147.75.109.163 port 45792 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:09:27.695887 sshd[8862]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:09:27.698429 systemd-logind[1465]: New session 10 of user core. Feb 9 10:09:27.698980 systemd[1]: Started session-10.scope. Feb 9 10:09:27.694000 audit[8862]: CRED_ACQ pid=8862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:27.879262 kernel: audit: type=1101 audit(1707473367.693:1613): pid=8862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:27.879324 kernel: audit: type=1103 audit(1707473367.694:1614): pid=8862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:27.879352 kernel: audit: type=1006 audit(1707473367.694:1615): pid=8862 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 10:09:27.938476 kernel: audit: type=1300 audit(1707473367.694:1615): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7cffd250 a2=3 a3=0 items=0 ppid=1 pid=8862 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:27.694000 audit[8862]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7cffd250 a2=3 a3=0 items=0 ppid=1 pid=8862 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:27.694000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:28.062025 kernel: audit: type=1327 audit(1707473367.694:1615): proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:28.062055 kernel: audit: type=1105 audit(1707473367.699:1616): pid=8862 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:27.699000 audit[8862]: USER_START pid=8862 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:28.106809 sshd[8862]: pam_unix(sshd:session): session closed for user core Feb 9 10:09:28.108204 systemd[1]: sshd@11-139.178.90.113:22-147.75.109.163:45792.service: Deactivated successfully. Feb 9 10:09:28.108666 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 10:09:28.109097 systemd-logind[1465]: Session 10 logged out. Waiting for processes to exit. Feb 9 10:09:28.109567 systemd-logind[1465]: Removed session 10. Feb 9 10:09:27.700000 audit[8864]: CRED_ACQ pid=8864 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:28.246918 kernel: audit: type=1103 audit(1707473367.700:1617): pid=8864 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:28.246960 kernel: audit: type=1106 audit(1707473368.105:1618): pid=8862 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:28.105000 audit[8862]: USER_END pid=8862 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:28.105000 audit[8862]: CRED_DISP pid=8862 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:28.432224 kernel: audit: type=1104 audit(1707473368.105:1619): pid=8862 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:28.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.113:22-147.75.109.163:45792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:33.116856 systemd[1]: Started sshd@12-139.178.90.113:22-147.75.109.163:45798.service. Feb 9 10:09:33.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.113:22-147.75.109.163:45798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:33.144203 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:09:33.144335 kernel: audit: type=1130 audit(1707473373.115:1621): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.113:22-147.75.109.163:45798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:33.265000 audit[8896]: USER_ACCT pid=8896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:33.267032 sshd[8896]: Accepted publickey for core from 147.75.109.163 port 45798 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:09:33.270838 sshd[8896]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:09:33.273198 systemd-logind[1465]: New session 11 of user core. Feb 9 10:09:33.273780 systemd[1]: Started session-11.scope. Feb 9 10:09:33.269000 audit[8896]: CRED_ACQ pid=8896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:33.363707 sshd[8896]: pam_unix(sshd:session): session closed for user core Feb 9 10:09:33.365127 systemd[1]: sshd@12-139.178.90.113:22-147.75.109.163:45798.service: Deactivated successfully. Feb 9 10:09:33.365564 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 10:09:33.365951 systemd-logind[1465]: Session 11 logged out. Waiting for processes to exit. Feb 9 10:09:33.366472 systemd-logind[1465]: Removed session 11. Feb 9 10:09:33.452538 kernel: audit: type=1101 audit(1707473373.265:1622): pid=8896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:33.452580 kernel: audit: type=1103 audit(1707473373.269:1623): pid=8896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:33.452599 kernel: audit: type=1006 audit(1707473373.269:1624): pid=8896 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 10:09:33.511619 kernel: audit: type=1300 audit(1707473373.269:1624): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedbaa7c20 a2=3 a3=0 items=0 ppid=1 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:33.269000 audit[8896]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedbaa7c20 a2=3 a3=0 items=0 ppid=1 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:33.604419 kernel: audit: type=1327 audit(1707473373.269:1624): proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:33.269000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:33.635190 kernel: audit: type=1105 audit(1707473373.274:1625): pid=8896 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:33.274000 audit[8896]: USER_START pid=8896 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:33.730499 kernel: audit: type=1103 audit(1707473373.274:1626): pid=8898 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:33.274000 audit[8898]: CRED_ACQ pid=8898 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:33.819797 kernel: audit: type=1106 audit(1707473373.362:1627): pid=8896 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:33.362000 audit[8896]: USER_END pid=8896 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:33.915455 kernel: audit: type=1104 audit(1707473373.362:1628): pid=8896 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:33.362000 audit[8896]: CRED_DISP pid=8896 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:33.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.113:22-147.75.109.163:45798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:38.037219 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 9 10:09:38.043194 systemd-tmpfiles[8929]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 10:09:38.043418 systemd-tmpfiles[8929]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 10:09:38.044123 systemd-tmpfiles[8929]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 10:09:38.054450 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 9 10:09:38.054551 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 9 10:09:38.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:38.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:38.056375 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 9 10:09:38.374043 systemd[1]: Started sshd@13-139.178.90.113:22-147.75.109.163:35426.service. Feb 9 10:09:38.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.113:22-147.75.109.163:35426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:38.400881 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 10:09:38.401000 kernel: audit: type=1130 audit(1707473378.373:1632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.113:22-147.75.109.163:35426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:38.523000 audit[8944]: USER_ACCT pid=8944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:38.523858 sshd[8944]: Accepted publickey for core from 147.75.109.163 port 35426 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:09:38.526961 sshd[8944]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:09:38.529405 systemd-logind[1465]: New session 12 of user core. Feb 9 10:09:38.530169 systemd[1]: Started session-12.scope. Feb 9 10:09:38.610747 sshd[8944]: pam_unix(sshd:session): session closed for user core Feb 9 10:09:38.612192 systemd[1]: sshd@13-139.178.90.113:22-147.75.109.163:35426.service: Deactivated successfully. Feb 9 10:09:38.612645 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 10:09:38.613010 systemd-logind[1465]: Session 12 logged out. Waiting for processes to exit. Feb 9 10:09:38.613420 systemd-logind[1465]: Removed session 12. Feb 9 10:09:38.526000 audit[8944]: CRED_ACQ pid=8944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:38.706227 kernel: audit: type=1101 audit(1707473378.523:1633): pid=8944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:38.706271 kernel: audit: type=1103 audit(1707473378.526:1634): pid=8944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:38.706291 kernel: audit: type=1006 audit(1707473378.526:1635): pid=8944 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 10:09:38.764849 kernel: audit: type=1300 audit(1707473378.526:1635): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff035362f0 a2=3 a3=0 items=0 ppid=1 pid=8944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:38.526000 audit[8944]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff035362f0 a2=3 a3=0 items=0 ppid=1 pid=8944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:38.526000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:38.887410 kernel: audit: type=1327 audit(1707473378.526:1635): proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:38.887436 kernel: audit: type=1105 audit(1707473378.532:1636): pid=8944 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:38.532000 audit[8944]: USER_START pid=8944 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:38.981883 kernel: audit: type=1103 audit(1707473378.532:1637): pid=8946 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:38.532000 audit[8946]: CRED_ACQ pid=8946 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:39.071124 kernel: audit: type=1106 audit(1707473378.610:1638): pid=8944 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:38.610000 audit[8944]: USER_END pid=8944 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:39.166759 kernel: audit: type=1104 audit(1707473378.610:1639): pid=8944 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:38.610000 audit[8944]: CRED_DISP pid=8944 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:38.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.113:22-147.75.109.163:35426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:38.758000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:09:38.758000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000add8c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:09:38.758000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:09:38.758000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:09:38.758000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00303abe0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:09:38.758000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:09:38.812000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:09:38.812000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00b133530 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:09:38.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:09:38.812000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:09:38.812000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00dfd4020 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:09:38.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:09:38.812000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:09:38.812000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00b1335c0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:09:38.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:09:38.812000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:09:38.812000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c012402240 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:09:38.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:09:38.815000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:09:38.815000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c011ec8c60 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:09:38.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:09:38.826000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:09:38.826000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00b1335f0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:09:38.826000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:09:42.804000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:09:42.804000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00303b5c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:09:42.804000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:09:42.804000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:09:42.804000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002ef2460 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:09:42.804000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:09:42.804000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:09:42.804000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0004ed1c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:09:42.804000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:09:42.804000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:09:42.804000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c001786240 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:09:42.804000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:09:43.621279 systemd[1]: Started sshd@14-139.178.90.113:22-147.75.109.163:35436.service. Feb 9 10:09:43.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.113:22-147.75.109.163:35436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:43.648482 kernel: kauditd_printk_skb: 37 callbacks suppressed Feb 9 10:09:43.648548 kernel: audit: type=1130 audit(1707473383.619:1653): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.113:22-147.75.109.163:35436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:43.770000 audit[9030]: USER_ACCT pid=9030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:43.771103 sshd[9030]: Accepted publickey for core from 147.75.109.163 port 35436 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:09:43.772858 sshd[9030]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:09:43.775257 systemd-logind[1465]: New session 13 of user core. Feb 9 10:09:43.775797 systemd[1]: Started session-13.scope. Feb 9 10:09:43.857538 sshd[9030]: pam_unix(sshd:session): session closed for user core Feb 9 10:09:43.858924 systemd[1]: sshd@14-139.178.90.113:22-147.75.109.163:35436.service: Deactivated successfully. Feb 9 10:09:43.859495 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 10:09:43.859947 systemd-logind[1465]: Session 13 logged out. Waiting for processes to exit. Feb 9 10:09:43.860391 systemd-logind[1465]: Removed session 13. Feb 9 10:09:43.771000 audit[9030]: CRED_ACQ pid=9030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:43.954879 kernel: audit: type=1101 audit(1707473383.770:1654): pid=9030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:43.954921 kernel: audit: type=1103 audit(1707473383.771:1655): pid=9030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:43.954941 kernel: audit: type=1006 audit(1707473383.771:1656): pid=9030 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 10:09:44.013458 kernel: audit: type=1300 audit(1707473383.771:1656): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc694d32d0 a2=3 a3=0 items=0 ppid=1 pid=9030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:43.771000 audit[9030]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc694d32d0 a2=3 a3=0 items=0 ppid=1 pid=9030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:44.105568 kernel: audit: type=1327 audit(1707473383.771:1656): proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:43.771000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:44.136052 kernel: audit: type=1105 audit(1707473383.776:1657): pid=9030 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:43.776000 audit[9030]: USER_START pid=9030 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:44.230504 kernel: audit: type=1103 audit(1707473383.777:1658): pid=9032 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:43.777000 audit[9032]: CRED_ACQ pid=9032 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:44.319697 kernel: audit: type=1106 audit(1707473383.856:1659): pid=9030 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:43.856000 audit[9030]: USER_END pid=9030 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:44.415197 kernel: audit: type=1104 audit(1707473383.856:1660): pid=9030 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:43.856000 audit[9030]: CRED_DISP pid=9030 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:43.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.113:22-147.75.109.163:35436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:48.063000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:09:48.063000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00181be80 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:09:48.063000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:09:48.132000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:09:48.132000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0017d39a0 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:09:48.132000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:09:48.869959 systemd[1]: Started sshd@15-139.178.90.113:22-147.75.109.163:33946.service. Feb 9 10:09:48.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.113:22-147.75.109.163:33946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:48.897625 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:09:48.897695 kernel: audit: type=1130 audit(1707473388.869:1664): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.113:22-147.75.109.163:33946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:49.019000 audit[9057]: USER_ACCT pid=9057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:49.020293 sshd[9057]: Accepted publickey for core from 147.75.109.163 port 33946 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:09:49.023561 sshd[9057]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:09:49.026109 systemd-logind[1465]: New session 14 of user core. Feb 9 10:09:49.026572 systemd[1]: Started session-14.scope. Feb 9 10:09:49.107445 sshd[9057]: pam_unix(sshd:session): session closed for user core Feb 9 10:09:49.108886 systemd[1]: sshd@15-139.178.90.113:22-147.75.109.163:33946.service: Deactivated successfully. Feb 9 10:09:49.109325 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 10:09:49.109732 systemd-logind[1465]: Session 14 logged out. Waiting for processes to exit. Feb 9 10:09:49.110254 systemd-logind[1465]: Removed session 14. Feb 9 10:09:49.022000 audit[9057]: CRED_ACQ pid=9057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:49.202457 kernel: audit: type=1101 audit(1707473389.019:1665): pid=9057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:49.202513 kernel: audit: type=1103 audit(1707473389.022:1666): pid=9057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:49.202532 kernel: audit: type=1006 audit(1707473389.022:1667): pid=9057 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 10:09:49.022000 audit[9057]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0d994640 a2=3 a3=0 items=0 ppid=1 pid=9057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:49.353198 kernel: audit: type=1300 audit(1707473389.022:1667): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0d994640 a2=3 a3=0 items=0 ppid=1 pid=9057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:49.353235 kernel: audit: type=1327 audit(1707473389.022:1667): proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:49.022000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:49.383714 kernel: audit: type=1105 audit(1707473389.029:1668): pid=9057 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:49.029000 audit[9057]: USER_START pid=9057 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:49.478214 kernel: audit: type=1103 audit(1707473389.030:1669): pid=9059 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:49.030000 audit[9059]: CRED_ACQ pid=9059 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:49.567407 kernel: audit: type=1106 audit(1707473389.107:1670): pid=9057 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:49.107000 audit[9057]: USER_END pid=9057 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:49.662996 kernel: audit: type=1104 audit(1707473389.107:1671): pid=9057 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:49.107000 audit[9057]: CRED_DISP pid=9057 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:49.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.113:22-147.75.109.163:33946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:52.465079 systemd[1]: Started sshd@16-139.178.90.113:22-85.209.11.27:38132.service. Feb 9 10:09:52.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.113:22-85.209.11.27:38132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:54.117836 systemd[1]: Started sshd@17-139.178.90.113:22-147.75.109.163:33962.service. Feb 9 10:09:54.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.113:22-147.75.109.163:33962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:54.145127 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 10:09:54.145189 kernel: audit: type=1130 audit(1707473394.117:1674): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.113:22-147.75.109.163:33962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:54.266000 audit[9126]: USER_ACCT pid=9126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:54.266902 sshd[9126]: Accepted publickey for core from 147.75.109.163 port 33962 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:09:54.268398 sshd[9126]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:09:54.270944 systemd-logind[1465]: New session 15 of user core. Feb 9 10:09:54.272667 systemd[1]: Started session-15.scope. Feb 9 10:09:54.267000 audit[9126]: CRED_ACQ pid=9126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:54.450554 kernel: audit: type=1101 audit(1707473394.266:1675): pid=9126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:54.450595 kernel: audit: type=1103 audit(1707473394.267:1676): pid=9126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:54.450611 kernel: audit: type=1006 audit(1707473394.267:1677): pid=9126 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 10:09:54.509128 kernel: audit: type=1300 audit(1707473394.267:1677): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff32a3e710 a2=3 a3=0 items=0 ppid=1 pid=9126 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:54.267000 audit[9126]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff32a3e710 a2=3 a3=0 items=0 ppid=1 pid=9126 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:54.544443 sshd[9126]: pam_unix(sshd:session): session closed for user core Feb 9 10:09:54.545741 systemd[1]: sshd@17-139.178.90.113:22-147.75.109.163:33962.service: Deactivated successfully. Feb 9 10:09:54.546192 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 10:09:54.546479 systemd-logind[1465]: Session 15 logged out. Waiting for processes to exit. Feb 9 10:09:54.546928 systemd-logind[1465]: Removed session 15. Feb 9 10:09:54.267000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:54.631643 kernel: audit: type=1327 audit(1707473394.267:1677): proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:54.631693 kernel: audit: type=1105 audit(1707473394.274:1678): pid=9126 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:54.274000 audit[9126]: USER_START pid=9126 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:54.275000 audit[9128]: CRED_ACQ pid=9128 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:54.815414 kernel: audit: type=1103 audit(1707473394.275:1679): pid=9128 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:54.815468 kernel: audit: type=1106 audit(1707473394.544:1680): pid=9126 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:54.544000 audit[9126]: USER_END pid=9126 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:54.544000 audit[9126]: CRED_DISP pid=9126 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:55.000234 kernel: audit: type=1104 audit(1707473394.544:1681): pid=9126 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:54.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.113:22-147.75.109.163:33962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:55.563742 sshd[9124]: Invalid user guest from 85.209.11.27 port 38132 Feb 9 10:09:56.036332 sshd[9124]: pam_faillock(sshd:auth): User unknown Feb 9 10:09:56.037441 sshd[9124]: pam_unix(sshd:auth): check pass; user unknown Feb 9 10:09:56.037533 sshd[9124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.27 Feb 9 10:09:56.038515 sshd[9124]: pam_faillock(sshd:auth): User unknown Feb 9 10:09:56.038000 audit[9124]: USER_AUTH pid=9124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="guest" exe="/usr/sbin/sshd" hostname=85.209.11.27 addr=85.209.11.27 terminal=ssh res=failed' Feb 9 10:09:58.470892 sshd[9124]: Failed password for invalid user guest from 85.209.11.27 port 38132 ssh2 Feb 9 10:09:59.554756 systemd[1]: Started sshd@18-139.178.90.113:22-147.75.109.163:45334.service. Feb 9 10:09:59.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.113:22-147.75.109.163:45334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:59.581641 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 10:09:59.581720 kernel: audit: type=1130 audit(1707473399.553:1684): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.113:22-147.75.109.163:45334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:59.581828 sshd[9124]: Connection closed by invalid user guest 85.209.11.27 port 38132 [preauth] Feb 9 10:09:59.582330 systemd[1]: sshd@16-139.178.90.113:22-85.209.11.27:38132.service: Deactivated successfully. Feb 9 10:09:59.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.113:22-85.209.11.27:38132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:59.703544 sshd[9157]: Accepted publickey for core from 147.75.109.163 port 45334 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:09:59.704837 sshd[9157]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:09:59.707171 systemd-logind[1465]: New session 16 of user core. Feb 9 10:09:59.707721 systemd[1]: Started session-16.scope. Feb 9 10:09:59.758962 kernel: audit: type=1131 audit(1707473399.580:1685): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.113:22-85.209.11.27:38132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:59.759061 kernel: audit: type=1101 audit(1707473399.701:1686): pid=9157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:59.701000 audit[9157]: USER_ACCT pid=9157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:59.786763 sshd[9157]: pam_unix(sshd:session): session closed for user core Feb 9 10:09:59.788202 systemd[1]: sshd@18-139.178.90.113:22-147.75.109.163:45334.service: Deactivated successfully. Feb 9 10:09:59.788674 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 10:09:59.789103 systemd-logind[1465]: Session 16 logged out. Waiting for processes to exit. Feb 9 10:09:59.789485 systemd-logind[1465]: Removed session 16. Feb 9 10:09:59.703000 audit[9157]: CRED_ACQ pid=9157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:59.941519 kernel: audit: type=1103 audit(1707473399.703:1687): pid=9157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:59.941600 kernel: audit: type=1006 audit(1707473399.703:1688): pid=9157 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 10:09:59.703000 audit[9157]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4e9325d0 a2=3 a3=0 items=0 ppid=1 pid=9157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:00.092007 kernel: audit: type=1300 audit(1707473399.703:1688): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4e9325d0 a2=3 a3=0 items=0 ppid=1 pid=9157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:59.703000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:00.122560 kernel: audit: type=1327 audit(1707473399.703:1688): proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:00.122609 kernel: audit: type=1105 audit(1707473399.708:1689): pid=9157 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:59.708000 audit[9157]: USER_START pid=9157 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:59.708000 audit[9160]: CRED_ACQ pid=9160 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:00.307131 kernel: audit: type=1103 audit(1707473399.708:1690): pid=9160 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:00.307223 kernel: audit: type=1106 audit(1707473399.785:1691): pid=9157 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:59.785000 audit[9157]: USER_END pid=9157 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:59.785000 audit[9157]: CRED_DISP pid=9157 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:09:59.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.113:22-147.75.109.163:45334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:04.796906 systemd[1]: Started sshd@19-139.178.90.113:22-147.75.109.163:57496.service. Feb 9 10:10:04.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.113:22-147.75.109.163:57496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:04.823894 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 10:10:04.824033 kernel: audit: type=1130 audit(1707473404.796:1694): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.113:22-147.75.109.163:57496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:04.947000 audit[9184]: USER_ACCT pid=9184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:04.947782 sshd[9184]: Accepted publickey for core from 147.75.109.163 port 57496 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:10:04.950885 sshd[9184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:10:04.953257 systemd-logind[1465]: New session 17 of user core. Feb 9 10:10:04.953962 systemd[1]: Started session-17.scope. Feb 9 10:10:05.032729 sshd[9184]: pam_unix(sshd:session): session closed for user core Feb 9 10:10:05.034192 systemd[1]: sshd@19-139.178.90.113:22-147.75.109.163:57496.service: Deactivated successfully. Feb 9 10:10:05.034710 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 10:10:05.035049 systemd-logind[1465]: Session 17 logged out. Waiting for processes to exit. Feb 9 10:10:05.035444 systemd-logind[1465]: Removed session 17. Feb 9 10:10:04.950000 audit[9184]: CRED_ACQ pid=9184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:05.130228 kernel: audit: type=1101 audit(1707473404.947:1695): pid=9184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:05.130295 kernel: audit: type=1103 audit(1707473404.950:1696): pid=9184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:05.130333 kernel: audit: type=1006 audit(1707473404.950:1697): pid=9184 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 10:10:04.950000 audit[9184]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca49e3810 a2=3 a3=0 items=0 ppid=1 pid=9184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:05.281481 kernel: audit: type=1300 audit(1707473404.950:1697): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca49e3810 a2=3 a3=0 items=0 ppid=1 pid=9184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:05.281526 kernel: audit: type=1327 audit(1707473404.950:1697): proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:04.950000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:04.955000 audit[9184]: USER_START pid=9184 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:05.407008 kernel: audit: type=1105 audit(1707473404.955:1698): pid=9184 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:05.407066 kernel: audit: type=1103 audit(1707473404.956:1699): pid=9186 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:04.956000 audit[9186]: CRED_ACQ pid=9186 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:05.032000 audit[9184]: USER_END pid=9184 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:05.592422 kernel: audit: type=1106 audit(1707473405.032:1700): pid=9184 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:05.592478 kernel: audit: type=1104 audit(1707473405.032:1701): pid=9184 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:05.032000 audit[9184]: CRED_DISP pid=9184 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:05.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.113:22-147.75.109.163:57496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:10.043323 systemd[1]: Started sshd@20-139.178.90.113:22-147.75.109.163:57510.service. Feb 9 10:10:10.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.113:22-147.75.109.163:57510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:10.070492 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:10:10.070580 kernel: audit: type=1130 audit(1707473410.042:1703): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.113:22-147.75.109.163:57510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:10.192000 audit[9210]: USER_ACCT pid=9210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:10.193356 sshd[9210]: Accepted publickey for core from 147.75.109.163 port 57510 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:10:10.194455 sshd[9210]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:10:10.196872 systemd-logind[1465]: New session 18 of user core. Feb 9 10:10:10.197549 systemd[1]: Started session-18.scope. Feb 9 10:10:10.276796 sshd[9210]: pam_unix(sshd:session): session closed for user core Feb 9 10:10:10.278240 systemd[1]: sshd@20-139.178.90.113:22-147.75.109.163:57510.service: Deactivated successfully. Feb 9 10:10:10.278718 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 10:10:10.279085 systemd-logind[1465]: Session 18 logged out. Waiting for processes to exit. Feb 9 10:10:10.279496 systemd-logind[1465]: Removed session 18. Feb 9 10:10:10.193000 audit[9210]: CRED_ACQ pid=9210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:10.286631 kernel: audit: type=1101 audit(1707473410.192:1704): pid=9210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:10.286674 kernel: audit: type=1103 audit(1707473410.193:1705): pid=9210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:10.435406 kernel: audit: type=1006 audit(1707473410.193:1706): pid=9210 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 9 10:10:10.435440 kernel: audit: type=1300 audit(1707473410.193:1706): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd34d300e0 a2=3 a3=0 items=0 ppid=1 pid=9210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:10.193000 audit[9210]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd34d300e0 a2=3 a3=0 items=0 ppid=1 pid=9210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:10.527792 kernel: audit: type=1327 audit(1707473410.193:1706): proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:10.193000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:10.199000 audit[9210]: USER_START pid=9210 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:10.653311 kernel: audit: type=1105 audit(1707473410.199:1707): pid=9210 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:10.653343 kernel: audit: type=1103 audit(1707473410.200:1708): pid=9212 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:10.200000 audit[9212]: CRED_ACQ pid=9212 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:10.742642 kernel: audit: type=1106 audit(1707473410.276:1709): pid=9210 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:10.276000 audit[9210]: USER_END pid=9210 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:10.277000 audit[9210]: CRED_DISP pid=9210 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:10.838637 kernel: audit: type=1104 audit(1707473410.277:1710): pid=9210 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:10.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.113:22-147.75.109.163:57510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:15.287657 systemd[1]: Started sshd@21-139.178.90.113:22-147.75.109.163:38110.service. Feb 9 10:10:15.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.113:22-147.75.109.163:38110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:15.314480 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:10:15.314520 kernel: audit: type=1130 audit(1707473415.286:1712): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.113:22-147.75.109.163:38110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:15.434000 audit[9281]: USER_ACCT pid=9281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:15.436035 sshd[9281]: Accepted publickey for core from 147.75.109.163 port 38110 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:10:15.437865 sshd[9281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:10:15.440312 systemd-logind[1465]: New session 19 of user core. Feb 9 10:10:15.441107 systemd[1]: Started session-19.scope. Feb 9 10:10:15.436000 audit[9281]: CRED_ACQ pid=9281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:15.531853 sshd[9281]: pam_unix(sshd:session): session closed for user core Feb 9 10:10:15.533332 systemd[1]: sshd@21-139.178.90.113:22-147.75.109.163:38110.service: Deactivated successfully. Feb 9 10:10:15.533818 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 10:10:15.534242 systemd-logind[1465]: Session 19 logged out. Waiting for processes to exit. Feb 9 10:10:15.534701 systemd-logind[1465]: Removed session 19. Feb 9 10:10:15.619928 kernel: audit: type=1101 audit(1707473415.434:1713): pid=9281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:15.619974 kernel: audit: type=1103 audit(1707473415.436:1714): pid=9281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:15.619994 kernel: audit: type=1006 audit(1707473415.436:1715): pid=9281 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 9 10:10:15.678485 kernel: audit: type=1300 audit(1707473415.436:1715): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff32ccc050 a2=3 a3=0 items=0 ppid=1 pid=9281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:15.436000 audit[9281]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff32ccc050 a2=3 a3=0 items=0 ppid=1 pid=9281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:15.770428 kernel: audit: type=1327 audit(1707473415.436:1715): proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:15.436000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:15.800914 kernel: audit: type=1105 audit(1707473415.441:1716): pid=9281 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:15.441000 audit[9281]: USER_START pid=9281 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:15.895326 kernel: audit: type=1103 audit(1707473415.442:1717): pid=9286 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:15.442000 audit[9286]: CRED_ACQ pid=9286 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:15.984456 kernel: audit: type=1106 audit(1707473415.531:1718): pid=9281 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:15.531000 audit[9281]: USER_END pid=9281 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:16.079890 kernel: audit: type=1104 audit(1707473415.531:1719): pid=9281 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:15.531000 audit[9281]: CRED_DISP pid=9281 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:15.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.113:22-147.75.109.163:38110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:20.541795 systemd[1]: Started sshd@22-139.178.90.113:22-147.75.109.163:38116.service. Feb 9 10:10:20.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.113:22-147.75.109.163:38116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:20.568956 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:10:20.568998 kernel: audit: type=1130 audit(1707473420.541:1721): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.113:22-147.75.109.163:38116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:20.691000 audit[9311]: USER_ACCT pid=9311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:20.692031 sshd[9311]: Accepted publickey for core from 147.75.109.163 port 38116 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:10:20.692850 sshd[9311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:10:20.695251 systemd-logind[1465]: New session 20 of user core. Feb 9 10:10:20.695953 systemd[1]: Started session-20.scope. Feb 9 10:10:20.774933 sshd[9311]: pam_unix(sshd:session): session closed for user core Feb 9 10:10:20.776325 systemd[1]: sshd@22-139.178.90.113:22-147.75.109.163:38116.service: Deactivated successfully. Feb 9 10:10:20.776821 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 10:10:20.777185 systemd-logind[1465]: Session 20 logged out. Waiting for processes to exit. Feb 9 10:10:20.777636 systemd-logind[1465]: Removed session 20. Feb 9 10:10:20.692000 audit[9311]: CRED_ACQ pid=9311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:20.873636 kernel: audit: type=1101 audit(1707473420.691:1722): pid=9311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:20.873672 kernel: audit: type=1103 audit(1707473420.692:1723): pid=9311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:20.873688 kernel: audit: type=1006 audit(1707473420.692:1724): pid=9311 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Feb 9 10:10:20.932139 kernel: audit: type=1300 audit(1707473420.692:1724): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8a5466b0 a2=3 a3=0 items=0 ppid=1 pid=9311 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:20.692000 audit[9311]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8a5466b0 a2=3 a3=0 items=0 ppid=1 pid=9311 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:21.024107 kernel: audit: type=1327 audit(1707473420.692:1724): proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:20.692000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:21.054590 kernel: audit: type=1105 audit(1707473420.697:1725): pid=9311 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:20.697000 audit[9311]: USER_START pid=9311 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:21.149033 kernel: audit: type=1103 audit(1707473420.698:1726): pid=9313 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:20.698000 audit[9313]: CRED_ACQ pid=9313 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:21.238228 kernel: audit: type=1106 audit(1707473420.774:1727): pid=9311 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:20.774000 audit[9311]: USER_END pid=9311 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:21.333726 kernel: audit: type=1104 audit(1707473420.775:1728): pid=9311 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:20.775000 audit[9311]: CRED_DISP pid=9311 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:20.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.113:22-147.75.109.163:38116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:25.785472 systemd[1]: Started sshd@23-139.178.90.113:22-147.75.109.163:55018.service. Feb 9 10:10:25.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.113:22-147.75.109.163:55018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:25.812614 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:10:25.812680 kernel: audit: type=1130 audit(1707473425.785:1730): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.113:22-147.75.109.163:55018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:25.933000 audit[9375]: USER_ACCT pid=9375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:25.933890 sshd[9375]: Accepted publickey for core from 147.75.109.163 port 55018 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:10:25.935172 sshd[9375]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:10:25.937579 systemd-logind[1465]: New session 21 of user core. Feb 9 10:10:25.938367 systemd[1]: Started session-21.scope. Feb 9 10:10:26.019382 sshd[9375]: pam_unix(sshd:session): session closed for user core Feb 9 10:10:26.020838 systemd[1]: sshd@23-139.178.90.113:22-147.75.109.163:55018.service: Deactivated successfully. Feb 9 10:10:26.021320 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 10:10:26.021698 systemd-logind[1465]: Session 21 logged out. Waiting for processes to exit. Feb 9 10:10:26.022121 systemd-logind[1465]: Removed session 21. Feb 9 10:10:25.934000 audit[9375]: CRED_ACQ pid=9375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:26.115474 kernel: audit: type=1101 audit(1707473425.933:1731): pid=9375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:26.115510 kernel: audit: type=1103 audit(1707473425.934:1732): pid=9375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:26.115527 kernel: audit: type=1006 audit(1707473425.934:1733): pid=9375 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 9 10:10:26.174007 kernel: audit: type=1300 audit(1707473425.934:1733): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec1352290 a2=3 a3=0 items=0 ppid=1 pid=9375 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:25.934000 audit[9375]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec1352290 a2=3 a3=0 items=0 ppid=1 pid=9375 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:26.265973 kernel: audit: type=1327 audit(1707473425.934:1733): proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:25.934000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:26.296455 kernel: audit: type=1105 audit(1707473425.940:1734): pid=9375 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:25.940000 audit[9375]: USER_START pid=9375 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:26.390926 kernel: audit: type=1103 audit(1707473425.940:1735): pid=9377 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:25.940000 audit[9377]: CRED_ACQ pid=9377 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:26.480163 kernel: audit: type=1106 audit(1707473426.019:1736): pid=9375 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:26.019000 audit[9375]: USER_END pid=9375 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:26.575638 kernel: audit: type=1104 audit(1707473426.019:1737): pid=9375 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:26.019000 audit[9375]: CRED_DISP pid=9375 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:26.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.113:22-147.75.109.163:55018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:31.029814 systemd[1]: Started sshd@24-139.178.90.113:22-147.75.109.163:55034.service. Feb 9 10:10:31.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.113:22-147.75.109.163:55034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:31.056850 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:10:31.056915 kernel: audit: type=1130 audit(1707473431.028:1739): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.113:22-147.75.109.163:55034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:31.178000 audit[9402]: USER_ACCT pid=9402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:31.179859 sshd[9402]: Accepted publickey for core from 147.75.109.163 port 55034 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:10:31.181287 sshd[9402]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:10:31.183574 systemd-logind[1465]: New session 22 of user core. Feb 9 10:10:31.184169 systemd[1]: Started session-22.scope. Feb 9 10:10:31.264607 sshd[9402]: pam_unix(sshd:session): session closed for user core Feb 9 10:10:31.266090 systemd[1]: sshd@24-139.178.90.113:22-147.75.109.163:55034.service: Deactivated successfully. Feb 9 10:10:31.266574 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 10:10:31.266994 systemd-logind[1465]: Session 22 logged out. Waiting for processes to exit. Feb 9 10:10:31.267486 systemd-logind[1465]: Removed session 22. Feb 9 10:10:31.179000 audit[9402]: CRED_ACQ pid=9402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:31.361567 kernel: audit: type=1101 audit(1707473431.178:1740): pid=9402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:31.361641 kernel: audit: type=1103 audit(1707473431.179:1741): pid=9402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:31.361660 kernel: audit: type=1006 audit(1707473431.179:1742): pid=9402 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 10:10:31.179000 audit[9402]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0f3e1ff0 a2=3 a3=0 items=0 ppid=1 pid=9402 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:31.512308 kernel: audit: type=1300 audit(1707473431.179:1742): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0f3e1ff0 a2=3 a3=0 items=0 ppid=1 pid=9402 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:31.512374 kernel: audit: type=1327 audit(1707473431.179:1742): proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:31.179000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:31.542942 kernel: audit: type=1105 audit(1707473431.184:1743): pid=9402 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:31.184000 audit[9402]: USER_START pid=9402 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:31.185000 audit[9404]: CRED_ACQ pid=9404 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:31.726806 kernel: audit: type=1103 audit(1707473431.185:1744): pid=9404 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:31.726854 kernel: audit: type=1106 audit(1707473431.263:1745): pid=9402 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:31.263000 audit[9402]: USER_END pid=9402 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:31.263000 audit[9402]: CRED_DISP pid=9402 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:31.911919 kernel: audit: type=1104 audit(1707473431.263:1746): pid=9402 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:31.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.113:22-147.75.109.163:55034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:36.274852 systemd[1]: Started sshd@25-139.178.90.113:22-147.75.109.163:37066.service. Feb 9 10:10:36.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.113:22-147.75.109.163:37066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:36.302132 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:10:36.302217 kernel: audit: type=1130 audit(1707473436.274:1748): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.113:22-147.75.109.163:37066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:36.441000 audit[9428]: USER_ACCT pid=9428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:36.442784 sshd[9428]: Accepted publickey for core from 147.75.109.163 port 37066 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:10:36.444998 sshd[9428]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:10:36.450756 systemd-logind[1465]: New session 23 of user core. Feb 9 10:10:36.452775 systemd[1]: Started session-23.scope. Feb 9 10:10:36.443000 audit[9428]: CRED_ACQ pid=9428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:36.539508 sshd[9428]: pam_unix(sshd:session): session closed for user core Feb 9 10:10:36.541058 systemd[1]: sshd@25-139.178.90.113:22-147.75.109.163:37066.service: Deactivated successfully. Feb 9 10:10:36.541544 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 10:10:36.541929 systemd-logind[1465]: Session 23 logged out. Waiting for processes to exit. Feb 9 10:10:36.542348 systemd-logind[1465]: Removed session 23. Feb 9 10:10:36.624628 kernel: audit: type=1101 audit(1707473436.441:1749): pid=9428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:36.624666 kernel: audit: type=1103 audit(1707473436.443:1750): pid=9428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:36.624682 kernel: audit: type=1006 audit(1707473436.444:1751): pid=9428 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 10:10:36.683234 kernel: audit: type=1300 audit(1707473436.444:1751): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe15ffc460 a2=3 a3=0 items=0 ppid=1 pid=9428 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:36.444000 audit[9428]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe15ffc460 a2=3 a3=0 items=0 ppid=1 pid=9428 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:36.775287 kernel: audit: type=1327 audit(1707473436.444:1751): proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:36.444000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:36.805805 kernel: audit: type=1105 audit(1707473436.459:1752): pid=9428 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:36.459000 audit[9428]: USER_START pid=9428 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:36.900314 kernel: audit: type=1103 audit(1707473436.461:1753): pid=9430 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:36.461000 audit[9430]: CRED_ACQ pid=9430 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:36.989547 kernel: audit: type=1106 audit(1707473436.539:1754): pid=9428 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:36.539000 audit[9428]: USER_END pid=9428 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:37.085058 kernel: audit: type=1104 audit(1707473436.539:1755): pid=9428 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:36.539000 audit[9428]: CRED_DISP pid=9428 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:36.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.113:22-147.75.109.163:37066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:38.759000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:10:38.759000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003138e20 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:10:38.759000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:10:38.760000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:10:38.760000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c8af60 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:10:38.760000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:10:38.813000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:10:38.813000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:10:38.813000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c011fadcb0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:10:38.813000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c015ba7ad0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:10:38.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:10:38.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:10:38.813000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:10:38.813000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c011549ce0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:10:38.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:10:38.813000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:10:38.813000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0039a57a0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:10:38.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:10:38.815000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:10:38.815000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c010bb5680 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:10:38.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:10:38.829000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:10:38.829000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c015ba6030 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:10:38.829000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:10:41.550390 systemd[1]: Started sshd@26-139.178.90.113:22-147.75.109.163:37074.service. Feb 9 10:10:41.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.113:22-147.75.109.163:37074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:41.577323 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:10:41.577411 kernel: audit: type=1130 audit(1707473441.548:1765): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.113:22-147.75.109.163:37074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:41.698000 audit[9477]: USER_ACCT pid=9477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:41.699518 sshd[9477]: Accepted publickey for core from 147.75.109.163 port 37074 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:10:41.701855 sshd[9477]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:10:41.704180 systemd-logind[1465]: New session 24 of user core. Feb 9 10:10:41.704747 systemd[1]: Started session-24.scope. Feb 9 10:10:41.784779 sshd[9477]: pam_unix(sshd:session): session closed for user core Feb 9 10:10:41.786121 systemd[1]: sshd@26-139.178.90.113:22-147.75.109.163:37074.service: Deactivated successfully. Feb 9 10:10:41.786569 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 10:10:41.786971 systemd-logind[1465]: Session 24 logged out. Waiting for processes to exit. Feb 9 10:10:41.787467 systemd-logind[1465]: Removed session 24. Feb 9 10:10:41.700000 audit[9477]: CRED_ACQ pid=9477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:41.882635 kernel: audit: type=1101 audit(1707473441.698:1766): pid=9477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:41.882701 kernel: audit: type=1103 audit(1707473441.700:1767): pid=9477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:41.882720 kernel: audit: type=1006 audit(1707473441.700:1768): pid=9477 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 10:10:41.941187 kernel: audit: type=1300 audit(1707473441.700:1768): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4d4e5a40 a2=3 a3=0 items=0 ppid=1 pid=9477 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:41.700000 audit[9477]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4d4e5a40 a2=3 a3=0 items=0 ppid=1 pid=9477 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:42.033248 kernel: audit: type=1327 audit(1707473441.700:1768): proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:41.700000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:42.063765 kernel: audit: type=1105 audit(1707473441.705:1769): pid=9477 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:41.705000 audit[9477]: USER_START pid=9477 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:42.158225 kernel: audit: type=1103 audit(1707473441.706:1770): pid=9479 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:41.706000 audit[9479]: CRED_ACQ pid=9479 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:42.247422 kernel: audit: type=1106 audit(1707473441.783:1771): pid=9477 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:41.783000 audit[9477]: USER_END pid=9477 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:42.342904 kernel: audit: type=1104 audit(1707473441.783:1772): pid=9477 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:41.783000 audit[9477]: CRED_DISP pid=9477 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:41.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.113:22-147.75.109.163:37074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:42.806000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:10:42.806000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012f8840 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:10:42.806000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:10:42.806000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:10:42.806000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002f13b00 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:10:42.806000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:10:42.806000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:10:42.806000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0012f8860 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:10:42.806000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:10:42.806000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:10:42.806000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ef2c80 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:10:42.806000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:10:46.794684 systemd[1]: Started sshd@27-139.178.90.113:22-147.75.109.163:55348.service. Feb 9 10:10:46.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.113:22-147.75.109.163:55348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:46.821893 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:10:46.821997 kernel: audit: type=1130 audit(1707473446.793:1778): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.113:22-147.75.109.163:55348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:46.943000 audit[9557]: USER_ACCT pid=9557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:46.944023 sshd[9557]: Accepted publickey for core from 147.75.109.163 port 55348 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:10:46.944749 sshd[9557]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:10:46.947150 systemd-logind[1465]: New session 25 of user core. Feb 9 10:10:46.947688 systemd[1]: Started session-25.scope. Feb 9 10:10:46.943000 audit[9557]: CRED_ACQ pid=9557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:47.037788 sshd[9557]: pam_unix(sshd:session): session closed for user core Feb 9 10:10:47.039259 systemd[1]: sshd@27-139.178.90.113:22-147.75.109.163:55348.service: Deactivated successfully. Feb 9 10:10:47.039750 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 10:10:47.040094 systemd-logind[1465]: Session 25 logged out. Waiting for processes to exit. Feb 9 10:10:47.040501 systemd-logind[1465]: Removed session 25. Feb 9 10:10:47.126004 kernel: audit: type=1101 audit(1707473446.943:1779): pid=9557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:47.126044 kernel: audit: type=1103 audit(1707473446.943:1780): pid=9557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:47.126062 kernel: audit: type=1006 audit(1707473446.943:1781): pid=9557 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 10:10:47.184635 kernel: audit: type=1300 audit(1707473446.943:1781): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff70c131f0 a2=3 a3=0 items=0 ppid=1 pid=9557 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:46.943000 audit[9557]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff70c131f0 a2=3 a3=0 items=0 ppid=1 pid=9557 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:47.276639 kernel: audit: type=1327 audit(1707473446.943:1781): proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:46.943000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:47.307139 kernel: audit: type=1105 audit(1707473446.949:1782): pid=9557 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:46.949000 audit[9557]: USER_START pid=9557 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:47.401626 kernel: audit: type=1103 audit(1707473446.950:1783): pid=9559 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:46.950000 audit[9559]: CRED_ACQ pid=9559 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:47.490825 kernel: audit: type=1106 audit(1707473447.037:1784): pid=9557 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:47.037000 audit[9557]: USER_END pid=9557 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:47.586290 kernel: audit: type=1104 audit(1707473447.038:1785): pid=9557 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:47.038000 audit[9557]: CRED_DISP pid=9557 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:47.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.113:22-147.75.109.163:55348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:48.065000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:10:48.065000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c810c0 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:10:48.065000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:10:48.133000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:10:48.133000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0017be940 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:10:48.133000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:10:52.051298 systemd[1]: Started sshd@28-139.178.90.113:22-147.75.109.163:55362.service. Feb 9 10:10:52.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.113:22-147.75.109.163:55362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:52.078876 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:10:52.078943 kernel: audit: type=1130 audit(1707473452.051:1789): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.113:22-147.75.109.163:55362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:52.201000 audit[9584]: USER_ACCT pid=9584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:52.202049 sshd[9584]: Accepted publickey for core from 147.75.109.163 port 55362 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:10:52.203375 sshd[9584]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:10:52.205888 systemd-logind[1465]: New session 26 of user core. Feb 9 10:10:52.206662 systemd[1]: Started session-26.scope. Feb 9 10:10:52.202000 audit[9584]: CRED_ACQ pid=9584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:52.384997 kernel: audit: type=1101 audit(1707473452.201:1790): pid=9584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:52.385065 kernel: audit: type=1103 audit(1707473452.202:1791): pid=9584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:52.385083 kernel: audit: type=1006 audit(1707473452.202:1792): pid=9584 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 10:10:52.202000 audit[9584]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca527b460 a2=3 a3=0 items=0 ppid=1 pid=9584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:52.535688 kernel: audit: type=1300 audit(1707473452.202:1792): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca527b460 a2=3 a3=0 items=0 ppid=1 pid=9584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:52.535783 kernel: audit: type=1327 audit(1707473452.202:1792): proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:52.202000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:52.566298 kernel: audit: type=1105 audit(1707473452.208:1793): pid=9584 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:52.208000 audit[9584]: USER_START pid=9584 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:52.566528 sshd[9584]: pam_unix(sshd:session): session closed for user core Feb 9 10:10:52.567914 systemd[1]: sshd@28-139.178.90.113:22-147.75.109.163:55362.service: Deactivated successfully. Feb 9 10:10:52.568346 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 10:10:52.568759 systemd-logind[1465]: Session 26 logged out. Waiting for processes to exit. Feb 9 10:10:52.569330 systemd-logind[1465]: Removed session 26. Feb 9 10:10:52.660958 kernel: audit: type=1103 audit(1707473452.209:1794): pid=9586 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:52.209000 audit[9586]: CRED_ACQ pid=9586 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:52.750206 kernel: audit: type=1106 audit(1707473452.566:1795): pid=9584 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:52.566000 audit[9584]: USER_END pid=9584 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:52.845719 kernel: audit: type=1104 audit(1707473452.566:1796): pid=9584 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:52.566000 audit[9584]: CRED_DISP pid=9584 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:52.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.113:22-147.75.109.163:55362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:57.550316 systemd[1]: Started sshd@29-139.178.90.113:22-147.75.109.163:54316.service. Feb 9 10:10:57.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.113:22-147.75.109.163:54316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:57.577566 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:10:57.577639 kernel: audit: type=1130 audit(1707473457.549:1798): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.113:22-147.75.109.163:54316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:10:57.698000 audit[9648]: USER_ACCT pid=9648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:57.700089 sshd[9648]: Accepted publickey for core from 147.75.109.163 port 54316 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:10:57.703116 sshd[9648]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:10:57.705649 systemd-logind[1465]: New session 27 of user core. Feb 9 10:10:57.706275 systemd[1]: Started session-27.scope. Feb 9 10:10:57.701000 audit[9648]: CRED_ACQ pid=9648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:57.794884 sshd[9648]: pam_unix(sshd:session): session closed for user core Feb 9 10:10:57.796256 systemd[1]: sshd@29-139.178.90.113:22-147.75.109.163:54316.service: Deactivated successfully. Feb 9 10:10:57.796724 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 10:10:57.797101 systemd-logind[1465]: Session 27 logged out. Waiting for processes to exit. Feb 9 10:10:57.797476 systemd-logind[1465]: Removed session 27. Feb 9 10:10:57.883032 kernel: audit: type=1101 audit(1707473457.698:1799): pid=9648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:57.883079 kernel: audit: type=1103 audit(1707473457.701:1800): pid=9648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:57.883097 kernel: audit: type=1006 audit(1707473457.701:1801): pid=9648 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 10:10:57.941635 kernel: audit: type=1300 audit(1707473457.701:1801): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf33fc7c0 a2=3 a3=0 items=0 ppid=1 pid=9648 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:57.701000 audit[9648]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf33fc7c0 a2=3 a3=0 items=0 ppid=1 pid=9648 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:10:58.033634 kernel: audit: type=1327 audit(1707473457.701:1801): proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:57.701000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:10:58.064121 kernel: audit: type=1105 audit(1707473457.707:1802): pid=9648 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:57.707000 audit[9648]: USER_START pid=9648 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:58.158637 kernel: audit: type=1103 audit(1707473457.707:1803): pid=9650 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:57.707000 audit[9650]: CRED_ACQ pid=9650 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:57.793000 audit[9648]: USER_END pid=9648 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:58.343235 kernel: audit: type=1106 audit(1707473457.793:1804): pid=9648 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:58.343277 kernel: audit: type=1104 audit(1707473457.794:1805): pid=9648 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:57.794000 audit[9648]: CRED_DISP pid=9648 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:10:57.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.113:22-147.75.109.163:54316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:02.805135 systemd[1]: Started sshd@30-139.178.90.113:22-147.75.109.163:54318.service. Feb 9 10:11:02.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.113:22-147.75.109.163:54318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:02.832302 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:11:02.832360 kernel: audit: type=1130 audit(1707473462.804:1807): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.113:22-147.75.109.163:54318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:02.952000 audit[9677]: USER_ACCT pid=9677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:02.953512 sshd[9677]: Accepted publickey for core from 147.75.109.163 port 54318 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:11:02.956578 sshd[9677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:11:02.958878 systemd-logind[1465]: New session 28 of user core. Feb 9 10:11:02.959322 systemd[1]: Started session-28.scope. Feb 9 10:11:02.955000 audit[9677]: CRED_ACQ pid=9677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:03.047095 sshd[9677]: pam_unix(sshd:session): session closed for user core Feb 9 10:11:03.048541 systemd[1]: sshd@30-139.178.90.113:22-147.75.109.163:54318.service: Deactivated successfully. Feb 9 10:11:03.049032 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 10:11:03.049394 systemd-logind[1465]: Session 28 logged out. Waiting for processes to exit. Feb 9 10:11:03.049895 systemd-logind[1465]: Removed session 28. Feb 9 10:11:03.135265 kernel: audit: type=1101 audit(1707473462.952:1808): pid=9677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:03.135307 kernel: audit: type=1103 audit(1707473462.955:1809): pid=9677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:03.135324 kernel: audit: type=1006 audit(1707473462.955:1810): pid=9677 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 10:11:03.193854 kernel: audit: type=1300 audit(1707473462.955:1810): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff44d54a00 a2=3 a3=0 items=0 ppid=1 pid=9677 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:02.955000 audit[9677]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff44d54a00 a2=3 a3=0 items=0 ppid=1 pid=9677 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:03.285836 kernel: audit: type=1327 audit(1707473462.955:1810): proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:02.955000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:03.316320 kernel: audit: type=1105 audit(1707473462.961:1811): pid=9677 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:02.961000 audit[9677]: USER_START pid=9677 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:03.410767 kernel: audit: type=1103 audit(1707473462.961:1812): pid=9681 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:02.961000 audit[9681]: CRED_ACQ pid=9681 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:03.499930 kernel: audit: type=1106 audit(1707473463.047:1813): pid=9677 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:03.047000 audit[9677]: USER_END pid=9677 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:03.595376 kernel: audit: type=1104 audit(1707473463.047:1814): pid=9677 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:03.047000 audit[9677]: CRED_DISP pid=9677 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:03.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.113:22-147.75.109.163:54318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:08.058178 systemd[1]: Started sshd@31-139.178.90.113:22-147.75.109.163:33960.service. Feb 9 10:11:08.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.113:22-147.75.109.163:33960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:08.085167 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:11:08.175577 kernel: audit: type=1130 audit(1707473468.057:1816): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.113:22-147.75.109.163:33960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:08.207000 audit[9704]: USER_ACCT pid=9704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:08.208029 sshd[9704]: Accepted publickey for core from 147.75.109.163 port 33960 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:11:08.209867 sshd[9704]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:11:08.212313 systemd-logind[1465]: New session 29 of user core. Feb 9 10:11:08.212809 systemd[1]: Started session-29.scope. Feb 9 10:11:08.291685 sshd[9704]: pam_unix(sshd:session): session closed for user core Feb 9 10:11:08.293294 systemd[1]: sshd@31-139.178.90.113:22-147.75.109.163:33960.service: Deactivated successfully. Feb 9 10:11:08.293735 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 10:11:08.294244 systemd-logind[1465]: Session 29 logged out. Waiting for processes to exit. Feb 9 10:11:08.294897 systemd-logind[1465]: Removed session 29. Feb 9 10:11:08.209000 audit[9704]: CRED_ACQ pid=9704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:08.389845 kernel: audit: type=1101 audit(1707473468.207:1817): pid=9704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:08.389886 kernel: audit: type=1103 audit(1707473468.209:1818): pid=9704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:08.389904 kernel: audit: type=1006 audit(1707473468.209:1819): pid=9704 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 9 10:11:08.448447 kernel: audit: type=1300 audit(1707473468.209:1819): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9e469970 a2=3 a3=0 items=0 ppid=1 pid=9704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:08.209000 audit[9704]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9e469970 a2=3 a3=0 items=0 ppid=1 pid=9704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:08.540481 kernel: audit: type=1327 audit(1707473468.209:1819): proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:08.209000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:08.571026 kernel: audit: type=1105 audit(1707473468.215:1820): pid=9704 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:08.215000 audit[9704]: USER_START pid=9704 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:08.665573 kernel: audit: type=1103 audit(1707473468.215:1821): pid=9706 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:08.215000 audit[9706]: CRED_ACQ pid=9706 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:08.292000 audit[9704]: USER_END pid=9704 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:08.850502 kernel: audit: type=1106 audit(1707473468.292:1822): pid=9704 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:08.850543 kernel: audit: type=1104 audit(1707473468.292:1823): pid=9704 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:08.292000 audit[9704]: CRED_DISP pid=9704 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:08.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.113:22-147.75.109.163:33960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:13.295566 systemd[1]: Started sshd@32-139.178.90.113:22-147.75.109.163:33972.service. Feb 9 10:11:13.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.113:22-147.75.109.163:33972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:13.323035 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:11:13.323118 kernel: audit: type=1130 audit(1707473473.294:1825): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.113:22-147.75.109.163:33972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:13.443000 audit[9770]: USER_ACCT pid=9770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:13.444700 sshd[9770]: Accepted publickey for core from 147.75.109.163 port 33972 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:11:13.445834 sshd[9770]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:11:13.448176 systemd-logind[1465]: New session 30 of user core. Feb 9 10:11:13.448873 systemd[1]: Started session-30.scope. Feb 9 10:11:13.444000 audit[9770]: CRED_ACQ pid=9770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:13.538260 sshd[9770]: pam_unix(sshd:session): session closed for user core Feb 9 10:11:13.539658 systemd[1]: sshd@32-139.178.90.113:22-147.75.109.163:33972.service: Deactivated successfully. Feb 9 10:11:13.540156 systemd[1]: session-30.scope: Deactivated successfully. Feb 9 10:11:13.540497 systemd-logind[1465]: Session 30 logged out. Waiting for processes to exit. Feb 9 10:11:13.540929 systemd-logind[1465]: Removed session 30. Feb 9 10:11:13.626630 kernel: audit: type=1101 audit(1707473473.443:1826): pid=9770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:13.626678 kernel: audit: type=1103 audit(1707473473.444:1827): pid=9770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:13.626697 kernel: audit: type=1006 audit(1707473473.444:1828): pid=9770 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Feb 9 10:11:13.685284 kernel: audit: type=1300 audit(1707473473.444:1828): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0c95b5d0 a2=3 a3=0 items=0 ppid=1 pid=9770 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:13.444000 audit[9770]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0c95b5d0 a2=3 a3=0 items=0 ppid=1 pid=9770 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:13.777499 kernel: audit: type=1327 audit(1707473473.444:1828): proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:13.444000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:13.808017 kernel: audit: type=1105 audit(1707473473.449:1829): pid=9770 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:13.449000 audit[9770]: USER_START pid=9770 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:13.902572 kernel: audit: type=1103 audit(1707473473.450:1830): pid=9778 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:13.450000 audit[9778]: CRED_ACQ pid=9778 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:13.991832 kernel: audit: type=1106 audit(1707473473.537:1831): pid=9770 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:13.537000 audit[9770]: USER_END pid=9770 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:14.087368 kernel: audit: type=1104 audit(1707473473.537:1832): pid=9770 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:13.537000 audit[9770]: CRED_DISP pid=9770 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:13.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.113:22-147.75.109.163:33972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:18.552006 systemd[1]: Started sshd@33-139.178.90.113:22-147.75.109.163:33934.service. Feb 9 10:11:18.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.113:22-147.75.109.163:33934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:18.579895 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:11:18.579956 kernel: audit: type=1130 audit(1707473478.552:1834): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.113:22-147.75.109.163:33934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:18.701000 audit[9816]: USER_ACCT pid=9816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:18.702531 sshd[9816]: Accepted publickey for core from 147.75.109.163 port 33934 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:11:18.703820 sshd[9816]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:11:18.706171 systemd-logind[1465]: New session 31 of user core. Feb 9 10:11:18.706896 systemd[1]: Started session-31.scope. Feb 9 10:11:18.785658 sshd[9816]: pam_unix(sshd:session): session closed for user core Feb 9 10:11:18.786999 systemd[1]: sshd@33-139.178.90.113:22-147.75.109.163:33934.service: Deactivated successfully. Feb 9 10:11:18.787446 systemd[1]: session-31.scope: Deactivated successfully. Feb 9 10:11:18.787832 systemd-logind[1465]: Session 31 logged out. Waiting for processes to exit. Feb 9 10:11:18.788295 systemd-logind[1465]: Removed session 31. Feb 9 10:11:18.703000 audit[9816]: CRED_ACQ pid=9816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:18.884395 kernel: audit: type=1101 audit(1707473478.701:1835): pid=9816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:18.884433 kernel: audit: type=1103 audit(1707473478.703:1836): pid=9816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:18.884454 kernel: audit: type=1006 audit(1707473478.703:1837): pid=9816 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Feb 9 10:11:18.943003 kernel: audit: type=1300 audit(1707473478.703:1837): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb48db4b0 a2=3 a3=0 items=0 ppid=1 pid=9816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:18.703000 audit[9816]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb48db4b0 a2=3 a3=0 items=0 ppid=1 pid=9816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:19.035132 kernel: audit: type=1327 audit(1707473478.703:1837): proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:18.703000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:19.065638 kernel: audit: type=1105 audit(1707473478.708:1838): pid=9816 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:18.708000 audit[9816]: USER_START pid=9816 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:19.160111 kernel: audit: type=1103 audit(1707473478.709:1839): pid=9818 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:18.709000 audit[9818]: CRED_ACQ pid=9818 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:19.249289 kernel: audit: type=1106 audit(1707473478.785:1840): pid=9816 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:18.785000 audit[9816]: USER_END pid=9816 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:19.344783 kernel: audit: type=1104 audit(1707473478.785:1841): pid=9816 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:18.785000 audit[9816]: CRED_DISP pid=9816 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:18.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.113:22-147.75.109.163:33934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:23.797528 systemd[1]: Started sshd@34-139.178.90.113:22-147.75.109.163:33940.service. Feb 9 10:11:23.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.113:22-147.75.109.163:33940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:23.824855 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:11:23.824915 kernel: audit: type=1130 audit(1707473483.796:1843): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.113:22-147.75.109.163:33940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:23.945000 audit[9882]: USER_ACCT pid=9882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:23.947087 sshd[9882]: Accepted publickey for core from 147.75.109.163 port 33940 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:11:23.948154 sshd[9882]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:11:23.950327 systemd-logind[1465]: New session 32 of user core. Feb 9 10:11:23.950920 systemd[1]: Started session-32.scope. Feb 9 10:11:24.033022 sshd[9882]: pam_unix(sshd:session): session closed for user core Feb 9 10:11:24.034421 systemd[1]: sshd@34-139.178.90.113:22-147.75.109.163:33940.service: Deactivated successfully. Feb 9 10:11:24.034861 systemd[1]: session-32.scope: Deactivated successfully. Feb 9 10:11:24.035240 systemd-logind[1465]: Session 32 logged out. Waiting for processes to exit. Feb 9 10:11:24.035733 systemd-logind[1465]: Removed session 32. Feb 9 10:11:23.946000 audit[9882]: CRED_ACQ pid=9882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:24.128950 kernel: audit: type=1101 audit(1707473483.945:1844): pid=9882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:24.129000 kernel: audit: type=1103 audit(1707473483.946:1845): pid=9882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:24.129019 kernel: audit: type=1006 audit(1707473483.946:1846): pid=9882 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Feb 9 10:11:24.187504 kernel: audit: type=1300 audit(1707473483.946:1846): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6b376240 a2=3 a3=0 items=0 ppid=1 pid=9882 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:23.946000 audit[9882]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6b376240 a2=3 a3=0 items=0 ppid=1 pid=9882 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:23.946000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:24.310041 kernel: audit: type=1327 audit(1707473483.946:1846): proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:24.310079 kernel: audit: type=1105 audit(1707473483.951:1847): pid=9882 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:23.951000 audit[9882]: USER_START pid=9882 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:24.404527 kernel: audit: type=1103 audit(1707473483.952:1848): pid=9884 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:23.952000 audit[9884]: CRED_ACQ pid=9884 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:24.493767 kernel: audit: type=1106 audit(1707473484.032:1849): pid=9882 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:24.032000 audit[9882]: USER_END pid=9882 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:24.589250 kernel: audit: type=1104 audit(1707473484.032:1850): pid=9882 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:24.032000 audit[9882]: CRED_DISP pid=9882 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:24.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.113:22-147.75.109.163:33940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:29.042854 systemd[1]: Started sshd@35-139.178.90.113:22-147.75.109.163:48252.service. Feb 9 10:11:29.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.113:22-147.75.109.163:48252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:29.069810 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:11:29.069877 kernel: audit: type=1130 audit(1707473489.042:1852): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.113:22-147.75.109.163:48252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:29.194000 audit[9910]: USER_ACCT pid=9910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:29.194926 sshd[9910]: Accepted publickey for core from 147.75.109.163 port 48252 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:11:29.196364 sshd[9910]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:11:29.198733 systemd-logind[1465]: New session 33 of user core. Feb 9 10:11:29.199244 systemd[1]: Started session-33.scope. Feb 9 10:11:29.195000 audit[9910]: CRED_ACQ pid=9910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:29.288472 sshd[9910]: pam_unix(sshd:session): session closed for user core Feb 9 10:11:29.290005 systemd[1]: sshd@35-139.178.90.113:22-147.75.109.163:48252.service: Deactivated successfully. Feb 9 10:11:29.290447 systemd[1]: session-33.scope: Deactivated successfully. Feb 9 10:11:29.290833 systemd-logind[1465]: Session 33 logged out. Waiting for processes to exit. Feb 9 10:11:29.291321 systemd-logind[1465]: Removed session 33. Feb 9 10:11:29.376778 kernel: audit: type=1101 audit(1707473489.194:1853): pid=9910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:29.376821 kernel: audit: type=1103 audit(1707473489.195:1854): pid=9910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:29.376841 kernel: audit: type=1006 audit(1707473489.195:1855): pid=9910 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 Feb 9 10:11:29.435371 kernel: audit: type=1300 audit(1707473489.195:1855): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef29a5c70 a2=3 a3=0 items=0 ppid=1 pid=9910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:29.195000 audit[9910]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef29a5c70 a2=3 a3=0 items=0 ppid=1 pid=9910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:29.527405 kernel: audit: type=1327 audit(1707473489.195:1855): proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:29.195000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:29.557889 kernel: audit: type=1105 audit(1707473489.200:1856): pid=9910 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:29.200000 audit[9910]: USER_START pid=9910 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:29.652438 kernel: audit: type=1103 audit(1707473489.201:1857): pid=9912 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:29.201000 audit[9912]: CRED_ACQ pid=9912 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:29.741636 kernel: audit: type=1106 audit(1707473489.288:1858): pid=9910 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:29.288000 audit[9910]: USER_END pid=9910 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:29.837125 kernel: audit: type=1104 audit(1707473489.288:1859): pid=9910 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:29.288000 audit[9910]: CRED_DISP pid=9910 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:29.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.113:22-147.75.109.163:48252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:34.299215 systemd[1]: Started sshd@36-139.178.90.113:22-147.75.109.163:48266.service. Feb 9 10:11:34.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.113:22-147.75.109.163:48266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:34.325938 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:11:34.325996 kernel: audit: type=1130 audit(1707473494.298:1861): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.113:22-147.75.109.163:48266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:34.483000 audit[9937]: USER_ACCT pid=9937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:34.484998 sshd[9937]: Accepted publickey for core from 147.75.109.163 port 48266 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:11:34.488070 sshd[9937]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:11:34.497682 systemd-logind[1465]: New session 34 of user core. Feb 9 10:11:34.500637 systemd[1]: Started session-34.scope. Feb 9 10:11:34.486000 audit[9937]: CRED_ACQ pid=9937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:34.589939 sshd[9937]: pam_unix(sshd:session): session closed for user core Feb 9 10:11:34.591305 systemd[1]: sshd@36-139.178.90.113:22-147.75.109.163:48266.service: Deactivated successfully. Feb 9 10:11:34.591750 systemd[1]: session-34.scope: Deactivated successfully. Feb 9 10:11:34.592131 systemd-logind[1465]: Session 34 logged out. Waiting for processes to exit. Feb 9 10:11:34.592519 systemd-logind[1465]: Removed session 34. Feb 9 10:11:34.667863 kernel: audit: type=1101 audit(1707473494.483:1862): pid=9937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:34.667898 kernel: audit: type=1103 audit(1707473494.486:1863): pid=9937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:34.667916 kernel: audit: type=1006 audit(1707473494.486:1864): pid=9937 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=34 res=1 Feb 9 10:11:34.726429 kernel: audit: type=1300 audit(1707473494.486:1864): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffccf103c0 a2=3 a3=0 items=0 ppid=1 pid=9937 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:34.486000 audit[9937]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffccf103c0 a2=3 a3=0 items=0 ppid=1 pid=9937 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:34.818429 kernel: audit: type=1327 audit(1707473494.486:1864): proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:34.486000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:34.511000 audit[9937]: USER_START pid=9937 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:34.943521 kernel: audit: type=1105 audit(1707473494.511:1865): pid=9937 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:34.943557 kernel: audit: type=1103 audit(1707473494.512:1866): pid=9939 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:34.512000 audit[9939]: CRED_ACQ pid=9939 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:35.032735 kernel: audit: type=1106 audit(1707473494.590:1867): pid=9937 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:34.590000 audit[9937]: USER_END pid=9937 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:34.590000 audit[9937]: CRED_DISP pid=9937 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:35.128618 kernel: audit: type=1104 audit(1707473494.590:1868): pid=9937 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:34.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.113:22-147.75.109.163:48266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:38.759000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:11:38.759000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003139c60 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:11:38.759000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:11:38.759000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:11:38.759000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026a4b70 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:11:38.759000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:11:38.813000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:11:38.813000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c013657e30 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:11:38.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:11:38.813000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:11:38.813000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c010b15440 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:11:38.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:11:38.813000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:11:38.813000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c013657f20 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:11:38.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:11:38.813000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:11:38.813000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01397b5c0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:11:38.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:11:38.815000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:11:38.815000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0034ab720 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:11:38.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:11:38.828000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:11:38.828000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01397b5f0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:11:38.828000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:11:39.600214 systemd[1]: Started sshd@37-139.178.90.113:22-147.75.109.163:53440.service. Feb 9 10:11:39.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.113:22-147.75.109.163:53440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:39.627338 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:11:39.627450 kernel: audit: type=1130 audit(1707473499.598:1878): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.113:22-147.75.109.163:53440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:39.748000 audit[9983]: USER_ACCT pid=9983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:39.749817 sshd[9983]: Accepted publickey for core from 147.75.109.163 port 53440 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:11:39.751857 sshd[9983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:11:39.754277 systemd-logind[1465]: New session 35 of user core. Feb 9 10:11:39.754853 systemd[1]: Started session-35.scope. Feb 9 10:11:39.833134 sshd[9983]: pam_unix(sshd:session): session closed for user core Feb 9 10:11:39.834549 systemd[1]: sshd@37-139.178.90.113:22-147.75.109.163:53440.service: Deactivated successfully. Feb 9 10:11:39.835000 systemd[1]: session-35.scope: Deactivated successfully. Feb 9 10:11:39.835338 systemd-logind[1465]: Session 35 logged out. Waiting for processes to exit. Feb 9 10:11:39.835743 systemd-logind[1465]: Removed session 35. Feb 9 10:11:39.750000 audit[9983]: CRED_ACQ pid=9983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:39.931576 kernel: audit: type=1101 audit(1707473499.748:1879): pid=9983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:39.931624 kernel: audit: type=1103 audit(1707473499.750:1880): pid=9983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:39.931679 kernel: audit: type=1006 audit(1707473499.750:1881): pid=9983 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=35 res=1 Feb 9 10:11:39.750000 audit[9983]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4e87f700 a2=3 a3=0 items=0 ppid=1 pid=9983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:40.082292 kernel: audit: type=1300 audit(1707473499.750:1881): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4e87f700 a2=3 a3=0 items=0 ppid=1 pid=9983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:40.082340 kernel: audit: type=1327 audit(1707473499.750:1881): proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:39.750000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:39.755000 audit[9983]: USER_START pid=9983 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:40.207331 kernel: audit: type=1105 audit(1707473499.755:1882): pid=9983 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:40.207393 kernel: audit: type=1103 audit(1707473499.755:1883): pid=9985 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:39.755000 audit[9985]: CRED_ACQ pid=9985 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:39.832000 audit[9983]: USER_END pid=9983 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:40.392260 kernel: audit: type=1106 audit(1707473499.832:1884): pid=9983 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:40.392320 kernel: audit: type=1104 audit(1707473499.832:1885): pid=9983 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:39.832000 audit[9983]: CRED_DISP pid=9983 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:39.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.113:22-147.75.109.163:53440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:42.807000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:11:42.807000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ba05e0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:11:42.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:11:42.807000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:11:42.807000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00248e840 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:11:42.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:11:42.807000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:11:42.807000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:11:42.807000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0029736a0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:11:42.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:11:42.807000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d8a720 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:11:42.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:11:44.843869 systemd[1]: Started sshd@38-139.178.90.113:22-147.75.109.163:47830.service. Feb 9 10:11:44.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.113:22-147.75.109.163:47830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:44.871104 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:11:44.871158 kernel: audit: type=1130 audit(1707473504.843:1891): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.113:22-147.75.109.163:47830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:44.993000 audit[10058]: USER_ACCT pid=10058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:44.993955 sshd[10058]: Accepted publickey for core from 147.75.109.163 port 47830 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:11:44.995867 sshd[10058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:11:44.998265 systemd-logind[1465]: New session 36 of user core. Feb 9 10:11:44.998748 systemd[1]: Started session-36.scope. Feb 9 10:11:45.080063 sshd[10058]: pam_unix(sshd:session): session closed for user core Feb 9 10:11:45.081509 systemd[1]: sshd@38-139.178.90.113:22-147.75.109.163:47830.service: Deactivated successfully. Feb 9 10:11:45.081946 systemd[1]: session-36.scope: Deactivated successfully. Feb 9 10:11:45.082342 systemd-logind[1465]: Session 36 logged out. Waiting for processes to exit. Feb 9 10:11:45.082867 systemd-logind[1465]: Removed session 36. Feb 9 10:11:44.995000 audit[10058]: CRED_ACQ pid=10058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:45.176421 kernel: audit: type=1101 audit(1707473504.993:1892): pid=10058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:45.176465 kernel: audit: type=1103 audit(1707473504.995:1893): pid=10058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:45.176486 kernel: audit: type=1006 audit(1707473504.995:1894): pid=10058 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=36 res=1 Feb 9 10:11:45.235294 kernel: audit: type=1300 audit(1707473504.995:1894): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc33f6c7d0 a2=3 a3=0 items=0 ppid=1 pid=10058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:44.995000 audit[10058]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc33f6c7d0 a2=3 a3=0 items=0 ppid=1 pid=10058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:45.327366 kernel: audit: type=1327 audit(1707473504.995:1894): proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:44.995000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:45.357853 kernel: audit: type=1105 audit(1707473505.000:1895): pid=10058 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:45.000000 audit[10058]: USER_START pid=10058 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:45.452378 kernel: audit: type=1103 audit(1707473505.000:1896): pid=10060 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:45.000000 audit[10060]: CRED_ACQ pid=10060 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:45.541635 kernel: audit: type=1106 audit(1707473505.080:1897): pid=10058 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:45.080000 audit[10058]: USER_END pid=10058 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:45.080000 audit[10058]: CRED_DISP pid=10058 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:45.726462 kernel: audit: type=1104 audit(1707473505.080:1898): pid=10058 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:45.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.113:22-147.75.109.163:47830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:48.066000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:11:48.066000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a28840 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:11:48.066000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:11:48.134000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:11:48.134000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00193c9a0 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:11:48.134000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:11:50.090278 systemd[1]: Started sshd@39-139.178.90.113:22-147.75.109.163:47842.service. Feb 9 10:11:50.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.113:22-147.75.109.163:47842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:50.117149 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:11:50.117294 kernel: audit: type=1130 audit(1707473510.088:1902): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.113:22-147.75.109.163:47842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:50.239901 sshd[10083]: Accepted publickey for core from 147.75.109.163 port 47842 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:11:50.238000 audit[10083]: USER_ACCT pid=10083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:50.240837 sshd[10083]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:11:50.243231 systemd-logind[1465]: New session 37 of user core. Feb 9 10:11:50.244074 systemd[1]: Started session-37.scope. Feb 9 10:11:50.326330 sshd[10083]: pam_unix(sshd:session): session closed for user core Feb 9 10:11:50.327701 systemd[1]: sshd@39-139.178.90.113:22-147.75.109.163:47842.service: Deactivated successfully. Feb 9 10:11:50.328146 systemd[1]: session-37.scope: Deactivated successfully. Feb 9 10:11:50.328442 systemd-logind[1465]: Session 37 logged out. Waiting for processes to exit. Feb 9 10:11:50.329075 systemd-logind[1465]: Removed session 37. Feb 9 10:11:50.239000 audit[10083]: CRED_ACQ pid=10083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:50.422072 kernel: audit: type=1101 audit(1707473510.238:1903): pid=10083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:50.422125 kernel: audit: type=1103 audit(1707473510.239:1904): pid=10083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:50.422167 kernel: audit: type=1006 audit(1707473510.239:1905): pid=10083 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=37 res=1 Feb 9 10:11:50.239000 audit[10083]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9ca3d7a0 a2=3 a3=0 items=0 ppid=1 pid=10083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:50.572768 kernel: audit: type=1300 audit(1707473510.239:1905): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9ca3d7a0 a2=3 a3=0 items=0 ppid=1 pid=10083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:50.239000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:50.573618 kernel: audit: type=1327 audit(1707473510.239:1905): proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:50.244000 audit[10083]: USER_START pid=10083 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:50.697985 kernel: audit: type=1105 audit(1707473510.244:1906): pid=10083 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:50.698017 kernel: audit: type=1103 audit(1707473510.245:1907): pid=10085 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:50.245000 audit[10085]: CRED_ACQ pid=10085 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:50.325000 audit[10083]: USER_END pid=10083 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:50.882766 kernel: audit: type=1106 audit(1707473510.325:1908): pid=10083 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:50.882801 kernel: audit: type=1104 audit(1707473510.325:1909): pid=10083 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:50.325000 audit[10083]: CRED_DISP pid=10083 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:50.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.113:22-147.75.109.163:47842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:55.339114 systemd[1]: Started sshd@40-139.178.90.113:22-147.75.109.163:42340.service. Feb 9 10:11:55.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.113:22-147.75.109.163:42340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:55.366600 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:11:55.366673 kernel: audit: type=1130 audit(1707473515.339:1911): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.113:22-147.75.109.163:42340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:11:55.488316 sshd[10149]: Accepted publickey for core from 147.75.109.163 port 42340 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:11:55.487000 audit[10149]: USER_ACCT pid=10149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:55.490847 sshd[10149]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:11:55.493259 systemd-logind[1465]: New session 38 of user core. Feb 9 10:11:55.493911 systemd[1]: Started session-38.scope. Feb 9 10:11:55.572900 sshd[10149]: pam_unix(sshd:session): session closed for user core Feb 9 10:11:55.574227 systemd[1]: sshd@40-139.178.90.113:22-147.75.109.163:42340.service: Deactivated successfully. Feb 9 10:11:55.574671 systemd[1]: session-38.scope: Deactivated successfully. Feb 9 10:11:55.575030 systemd-logind[1465]: Session 38 logged out. Waiting for processes to exit. Feb 9 10:11:55.575472 systemd-logind[1465]: Removed session 38. Feb 9 10:11:55.490000 audit[10149]: CRED_ACQ pid=10149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:55.672031 kernel: audit: type=1101 audit(1707473515.487:1912): pid=10149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:55.672105 kernel: audit: type=1103 audit(1707473515.490:1913): pid=10149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:55.672152 kernel: audit: type=1006 audit(1707473515.490:1914): pid=10149 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=38 res=1 Feb 9 10:11:55.490000 audit[10149]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdacd89f10 a2=3 a3=0 items=0 ppid=1 pid=10149 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:55.822651 kernel: audit: type=1300 audit(1707473515.490:1914): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdacd89f10 a2=3 a3=0 items=0 ppid=1 pid=10149 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:11:55.490000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:55.823614 kernel: audit: type=1327 audit(1707473515.490:1914): proctitle=737368643A20636F7265205B707269765D Feb 9 10:11:55.495000 audit[10149]: USER_START pid=10149 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:55.947838 kernel: audit: type=1105 audit(1707473515.495:1915): pid=10149 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:55.947871 kernel: audit: type=1103 audit(1707473515.496:1916): pid=10151 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:55.496000 audit[10151]: CRED_ACQ pid=10151 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:56.037078 kernel: audit: type=1106 audit(1707473515.572:1917): pid=10149 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:55.572000 audit[10149]: USER_END pid=10149 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:56.132643 kernel: audit: type=1104 audit(1707473515.573:1918): pid=10149 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:55.573000 audit[10149]: CRED_DISP pid=10149 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:11:55.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.113:22-147.75.109.163:42340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:00.583004 systemd[1]: Started sshd@41-139.178.90.113:22-147.75.109.163:42356.service. Feb 9 10:12:00.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.113:22-147.75.109.163:42356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:00.610077 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:12:00.610153 kernel: audit: type=1130 audit(1707473520.582:1920): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.113:22-147.75.109.163:42356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:00.759000 audit[10176]: USER_ACCT pid=10176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:00.760749 sshd[10176]: Accepted publickey for core from 147.75.109.163 port 42356 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:00.765059 sshd[10176]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:00.775881 systemd-logind[1465]: New session 39 of user core. Feb 9 10:12:00.778764 systemd[1]: Started session-39.scope. Feb 9 10:12:00.763000 audit[10176]: CRED_ACQ pid=10176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:00.868957 sshd[10176]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:00.870292 systemd[1]: sshd@41-139.178.90.113:22-147.75.109.163:42356.service: Deactivated successfully. Feb 9 10:12:00.870785 systemd[1]: session-39.scope: Deactivated successfully. Feb 9 10:12:00.871124 systemd-logind[1465]: Session 39 logged out. Waiting for processes to exit. Feb 9 10:12:00.871498 systemd-logind[1465]: Removed session 39. Feb 9 10:12:00.944263 kernel: audit: type=1101 audit(1707473520.759:1921): pid=10176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:00.944303 kernel: audit: type=1103 audit(1707473520.763:1922): pid=10176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:00.944323 kernel: audit: type=1006 audit(1707473520.763:1923): pid=10176 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=39 res=1 Feb 9 10:12:01.002911 kernel: audit: type=1300 audit(1707473520.763:1923): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec483e4e0 a2=3 a3=0 items=0 ppid=1 pid=10176 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:00.763000 audit[10176]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec483e4e0 a2=3 a3=0 items=0 ppid=1 pid=10176 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:01.094943 kernel: audit: type=1327 audit(1707473520.763:1923): proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:00.763000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:00.789000 audit[10176]: USER_START pid=10176 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:01.219965 kernel: audit: type=1105 audit(1707473520.789:1924): pid=10176 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:01.220029 kernel: audit: type=1103 audit(1707473520.791:1925): pid=10178 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:00.791000 audit[10178]: CRED_ACQ pid=10178 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:01.309239 kernel: audit: type=1106 audit(1707473520.868:1926): pid=10176 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:00.868000 audit[10176]: USER_END pid=10176 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:01.404786 kernel: audit: type=1104 audit(1707473520.869:1927): pid=10176 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:00.869000 audit[10176]: CRED_DISP pid=10176 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:00.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.113:22-147.75.109.163:42356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:05.879591 systemd[1]: Started sshd@42-139.178.90.113:22-147.75.109.163:58440.service. Feb 9 10:12:05.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.113:22-147.75.109.163:58440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:05.906626 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:12:05.906699 kernel: audit: type=1130 audit(1707473525.878:1929): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.113:22-147.75.109.163:58440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:06.027000 audit[10203]: USER_ACCT pid=10203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:06.028803 sshd[10203]: Accepted publickey for core from 147.75.109.163 port 58440 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:06.030878 sshd[10203]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:06.033186 systemd-logind[1465]: New session 40 of user core. Feb 9 10:12:06.033762 systemd[1]: Started session-40.scope. Feb 9 10:12:06.113180 sshd[10203]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:06.114644 systemd[1]: sshd@42-139.178.90.113:22-147.75.109.163:58440.service: Deactivated successfully. Feb 9 10:12:06.115090 systemd[1]: session-40.scope: Deactivated successfully. Feb 9 10:12:06.115381 systemd-logind[1465]: Session 40 logged out. Waiting for processes to exit. Feb 9 10:12:06.115821 systemd-logind[1465]: Removed session 40. Feb 9 10:12:06.027000 audit[10203]: CRED_ACQ pid=10203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:06.210713 kernel: audit: type=1101 audit(1707473526.027:1930): pid=10203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:06.210757 kernel: audit: type=1103 audit(1707473526.027:1931): pid=10203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:06.210774 kernel: audit: type=1006 audit(1707473526.027:1932): pid=10203 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=40 res=1 Feb 9 10:12:06.269361 kernel: audit: type=1300 audit(1707473526.027:1932): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff9fedd90 a2=3 a3=0 items=0 ppid=1 pid=10203 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:06.027000 audit[10203]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff9fedd90 a2=3 a3=0 items=0 ppid=1 pid=10203 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:06.361392 kernel: audit: type=1327 audit(1707473526.027:1932): proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:06.027000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:06.391883 kernel: audit: type=1105 audit(1707473526.034:1933): pid=10203 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:06.034000 audit[10203]: USER_START pid=10203 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:06.486388 kernel: audit: type=1103 audit(1707473526.034:1934): pid=10205 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:06.034000 audit[10205]: CRED_ACQ pid=10205 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:06.110000 audit[10203]: USER_END pid=10203 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:06.671204 kernel: audit: type=1106 audit(1707473526.110:1935): pid=10203 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:06.671241 kernel: audit: type=1104 audit(1707473526.110:1936): pid=10203 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:06.110000 audit[10203]: CRED_DISP pid=10203 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:06.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.113:22-147.75.109.163:58440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:11.123098 systemd[1]: Started sshd@43-139.178.90.113:22-147.75.109.163:58444.service. Feb 9 10:12:11.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.113:22-147.75.109.163:58444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:11.150198 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:12:11.150296 kernel: audit: type=1130 audit(1707473531.122:1938): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.113:22-147.75.109.163:58444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:11.271000 audit[10231]: USER_ACCT pid=10231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:11.272461 sshd[10231]: Accepted publickey for core from 147.75.109.163 port 58444 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:11.273813 sshd[10231]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:11.276220 systemd-logind[1465]: New session 41 of user core. Feb 9 10:12:11.276836 systemd[1]: Started session-41.scope. Feb 9 10:12:11.358340 sshd[10231]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:11.359862 systemd[1]: sshd@43-139.178.90.113:22-147.75.109.163:58444.service: Deactivated successfully. Feb 9 10:12:11.360351 systemd[1]: session-41.scope: Deactivated successfully. Feb 9 10:12:11.360731 systemd-logind[1465]: Session 41 logged out. Waiting for processes to exit. Feb 9 10:12:11.361151 systemd-logind[1465]: Removed session 41. Feb 9 10:12:11.273000 audit[10231]: CRED_ACQ pid=10231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:11.366661 kernel: audit: type=1101 audit(1707473531.271:1939): pid=10231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:11.366715 kernel: audit: type=1103 audit(1707473531.273:1940): pid=10231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:11.515386 kernel: audit: type=1006 audit(1707473531.273:1941): pid=10231 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=41 res=1 Feb 9 10:12:11.515461 kernel: audit: type=1300 audit(1707473531.273:1941): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea1197130 a2=3 a3=0 items=0 ppid=1 pid=10231 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:11.273000 audit[10231]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea1197130 a2=3 a3=0 items=0 ppid=1 pid=10231 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:11.273000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:11.637968 kernel: audit: type=1327 audit(1707473531.273:1941): proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:11.638018 kernel: audit: type=1105 audit(1707473531.278:1942): pid=10231 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:11.278000 audit[10231]: USER_START pid=10231 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:11.279000 audit[10233]: CRED_ACQ pid=10233 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:11.732593 kernel: audit: type=1103 audit(1707473531.279:1943): pid=10233 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:11.358000 audit[10231]: USER_END pid=10231 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:11.918987 kernel: audit: type=1106 audit(1707473531.358:1944): pid=10231 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:11.919070 kernel: audit: type=1104 audit(1707473531.358:1945): pid=10231 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:11.358000 audit[10231]: CRED_DISP pid=10231 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:11.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.113:22-147.75.109.163:58444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:16.362509 systemd[1]: Started sshd@44-139.178.90.113:22-147.75.109.163:43938.service. Feb 9 10:12:16.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.113:22-147.75.109.163:43938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:16.389619 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:12:16.389740 kernel: audit: type=1130 audit(1707473536.361:1947): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.113:22-147.75.109.163:43938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:16.511000 audit[10303]: USER_ACCT pid=10303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:16.512550 sshd[10303]: Accepted publickey for core from 147.75.109.163 port 43938 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:16.513883 sshd[10303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:16.516197 systemd-logind[1465]: New session 42 of user core. Feb 9 10:12:16.516840 systemd[1]: Started session-42.scope. Feb 9 10:12:16.598185 sshd[10303]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:16.599623 systemd[1]: sshd@44-139.178.90.113:22-147.75.109.163:43938.service: Deactivated successfully. Feb 9 10:12:16.600067 systemd[1]: session-42.scope: Deactivated successfully. Feb 9 10:12:16.600378 systemd-logind[1465]: Session 42 logged out. Waiting for processes to exit. Feb 9 10:12:16.600847 systemd-logind[1465]: Removed session 42. Feb 9 10:12:16.512000 audit[10303]: CRED_ACQ pid=10303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:16.695876 kernel: audit: type=1101 audit(1707473536.511:1948): pid=10303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:16.695916 kernel: audit: type=1103 audit(1707473536.512:1949): pid=10303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:16.695932 kernel: audit: type=1006 audit(1707473536.512:1950): pid=10303 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=42 res=1 Feb 9 10:12:16.512000 audit[10303]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb560e600 a2=3 a3=0 items=0 ppid=1 pid=10303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:16.846459 kernel: audit: type=1300 audit(1707473536.512:1950): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb560e600 a2=3 a3=0 items=0 ppid=1 pid=10303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:16.846501 kernel: audit: type=1327 audit(1707473536.512:1950): proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:16.512000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:16.876909 kernel: audit: type=1105 audit(1707473536.517:1951): pid=10303 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:16.517000 audit[10303]: USER_START pid=10303 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:16.971315 kernel: audit: type=1103 audit(1707473536.518:1952): pid=10305 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:16.518000 audit[10305]: CRED_ACQ pid=10305 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:17.060471 kernel: audit: type=1106 audit(1707473536.597:1953): pid=10303 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:16.597000 audit[10303]: USER_END pid=10303 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:17.155897 kernel: audit: type=1104 audit(1707473536.597:1954): pid=10303 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:16.597000 audit[10303]: CRED_DISP pid=10303 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:16.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.113:22-147.75.109.163:43938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:21.608482 systemd[1]: Started sshd@45-139.178.90.113:22-147.75.109.163:43944.service. Feb 9 10:12:21.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.113:22-147.75.109.163:43944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:21.635457 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:12:21.635492 kernel: audit: type=1130 audit(1707473541.608:1956): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.113:22-147.75.109.163:43944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:21.757000 audit[10329]: USER_ACCT pid=10329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:21.758058 sshd[10329]: Accepted publickey for core from 147.75.109.163 port 43944 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:21.758846 sshd[10329]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:21.761217 systemd-logind[1465]: New session 43 of user core. Feb 9 10:12:21.761850 systemd[1]: Started session-43.scope. Feb 9 10:12:21.845932 sshd[10329]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:21.847201 systemd[1]: sshd@45-139.178.90.113:22-147.75.109.163:43944.service: Deactivated successfully. Feb 9 10:12:21.847683 systemd[1]: session-43.scope: Deactivated successfully. Feb 9 10:12:21.847974 systemd-logind[1465]: Session 43 logged out. Waiting for processes to exit. Feb 9 10:12:21.848322 systemd-logind[1465]: Removed session 43. Feb 9 10:12:21.758000 audit[10329]: CRED_ACQ pid=10329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:21.942147 kernel: audit: type=1101 audit(1707473541.757:1957): pid=10329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:21.942191 kernel: audit: type=1103 audit(1707473541.758:1958): pid=10329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:21.942209 kernel: audit: type=1006 audit(1707473541.758:1959): pid=10329 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=43 res=1 Feb 9 10:12:22.000762 kernel: audit: type=1300 audit(1707473541.758:1959): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb735d70 a2=3 a3=0 items=0 ppid=1 pid=10329 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:21.758000 audit[10329]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb735d70 a2=3 a3=0 items=0 ppid=1 pid=10329 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:22.092729 kernel: audit: type=1327 audit(1707473541.758:1959): proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:21.758000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:22.123170 kernel: audit: type=1105 audit(1707473541.763:1960): pid=10329 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:21.763000 audit[10329]: USER_START pid=10329 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:22.217636 kernel: audit: type=1103 audit(1707473541.764:1961): pid=10331 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:21.764000 audit[10331]: CRED_ACQ pid=10331 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:22.306856 kernel: audit: type=1106 audit(1707473541.845:1962): pid=10329 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:21.845000 audit[10329]: USER_END pid=10329 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:22.402278 kernel: audit: type=1104 audit(1707473541.846:1963): pid=10329 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:21.846000 audit[10329]: CRED_DISP pid=10329 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:21.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.113:22-147.75.109.163:43944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:23.778779 systemd[1]: Started sshd@46-139.178.90.113:22-170.64.196.239:39536.service. Feb 9 10:12:23.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.113:22-170.64.196.239:39536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:24.369007 sshd[10394]: Invalid user se from 170.64.196.239 port 39536 Feb 9 10:12:24.519810 sshd[10394]: pam_faillock(sshd:auth): User unknown Feb 9 10:12:24.520951 sshd[10394]: pam_unix(sshd:auth): check pass; user unknown Feb 9 10:12:24.521045 sshd[10394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.196.239 Feb 9 10:12:24.521985 sshd[10394]: pam_faillock(sshd:auth): User unknown Feb 9 10:12:24.521000 audit[10394]: USER_AUTH pid=10394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="se" exe="/usr/sbin/sshd" hostname=170.64.196.239 addr=170.64.196.239 terminal=ssh res=failed' Feb 9 10:12:26.274051 sshd[10394]: Failed password for invalid user se from 170.64.196.239 port 39536 ssh2 Feb 9 10:12:26.856122 systemd[1]: Started sshd@47-139.178.90.113:22-147.75.109.163:33890.service. Feb 9 10:12:26.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.113:22-147.75.109.163:33890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:26.883036 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 10:12:26.883103 kernel: audit: type=1130 audit(1707473546.855:1967): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.113:22-147.75.109.163:33890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:26.915536 sshd[10398]: Accepted publickey for core from 147.75.109.163 port 33890 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:26.916892 sshd[10398]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:26.919850 systemd-logind[1465]: New session 44 of user core. Feb 9 10:12:26.920523 systemd[1]: Started session-44.scope. Feb 9 10:12:26.914000 audit[10398]: USER_ACCT pid=10398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:27.000877 sshd[10398]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:27.002275 systemd[1]: sshd@47-139.178.90.113:22-147.75.109.163:33890.service: Deactivated successfully. Feb 9 10:12:27.002725 systemd[1]: session-44.scope: Deactivated successfully. Feb 9 10:12:27.003065 systemd-logind[1465]: Session 44 logged out. Waiting for processes to exit. Feb 9 10:12:27.003466 systemd-logind[1465]: Removed session 44. Feb 9 10:12:27.065064 kernel: audit: type=1101 audit(1707473546.914:1968): pid=10398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:27.065106 kernel: audit: type=1103 audit(1707473546.916:1969): pid=10398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:26.916000 audit[10398]: CRED_ACQ pid=10398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:27.155632 kernel: audit: type=1006 audit(1707473546.916:1970): pid=10398 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=44 res=1 Feb 9 10:12:27.214210 kernel: audit: type=1300 audit(1707473546.916:1970): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8db95580 a2=3 a3=0 items=0 ppid=1 pid=10398 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:26.916000 audit[10398]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8db95580 a2=3 a3=0 items=0 ppid=1 pid=10398 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:27.290203 sshd[10394]: Connection closed by invalid user se 170.64.196.239 port 39536 [preauth] Feb 9 10:12:27.290706 systemd[1]: sshd@46-139.178.90.113:22-170.64.196.239:39536.service: Deactivated successfully. Feb 9 10:12:27.306180 kernel: audit: type=1327 audit(1707473546.916:1970): proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:26.916000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:27.336639 kernel: audit: type=1105 audit(1707473546.922:1971): pid=10398 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:26.922000 audit[10398]: USER_START pid=10398 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:27.431028 kernel: audit: type=1103 audit(1707473546.923:1972): pid=10400 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:26.923000 audit[10400]: CRED_ACQ pid=10400 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:27.520207 kernel: audit: type=1106 audit(1707473547.001:1973): pid=10398 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:27.001000 audit[10398]: USER_END pid=10398 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:27.615618 kernel: audit: type=1104 audit(1707473547.001:1974): pid=10398 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:27.001000 audit[10398]: CRED_DISP pid=10398 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:27.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.113:22-147.75.109.163:33890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:27.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.113:22-170.64.196.239:39536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:32.012411 systemd[1]: Started sshd@48-139.178.90.113:22-147.75.109.163:33896.service. Feb 9 10:12:32.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.113:22-147.75.109.163:33896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:32.047399 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 10:12:32.047482 kernel: audit: type=1130 audit(1707473552.011:1977): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.113:22-147.75.109.163:33896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:32.166000 audit[10428]: USER_ACCT pid=10428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.168210 sshd[10428]: Accepted publickey for core from 147.75.109.163 port 33896 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:32.170860 sshd[10428]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:32.173246 systemd-logind[1465]: New session 45 of user core. Feb 9 10:12:32.173969 systemd[1]: Started session-45.scope. Feb 9 10:12:32.251785 sshd[10428]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:32.253974 systemd[1]: sshd@48-139.178.90.113:22-147.75.109.163:33896.service: Deactivated successfully. Feb 9 10:12:32.254382 systemd[1]: session-45.scope: Deactivated successfully. Feb 9 10:12:32.254746 systemd-logind[1465]: Session 45 logged out. Waiting for processes to exit. Feb 9 10:12:32.255354 systemd[1]: Started sshd@49-139.178.90.113:22-147.75.109.163:33902.service. Feb 9 10:12:32.255838 systemd-logind[1465]: Removed session 45. Feb 9 10:12:32.169000 audit[10428]: CRED_ACQ pid=10428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.350041 kernel: audit: type=1101 audit(1707473552.166:1978): pid=10428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.350122 kernel: audit: type=1103 audit(1707473552.169:1979): pid=10428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.350143 kernel: audit: type=1006 audit(1707473552.169:1980): pid=10428 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=45 res=1 Feb 9 10:12:32.169000 audit[10428]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbeba2120 a2=3 a3=0 items=0 ppid=1 pid=10428 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:32.440961 sshd[10454]: Accepted publickey for core from 147.75.109.163 port 33902 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:32.442317 sshd[10454]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:32.444491 systemd-logind[1465]: New session 46 of user core. Feb 9 10:12:32.445208 systemd[1]: Started session-46.scope. Feb 9 10:12:32.500762 kernel: audit: type=1300 audit(1707473552.169:1980): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbeba2120 a2=3 a3=0 items=0 ppid=1 pid=10428 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:32.500831 kernel: audit: type=1327 audit(1707473552.169:1980): proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:32.169000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:32.174000 audit[10428]: USER_START pid=10428 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.625632 kernel: audit: type=1105 audit(1707473552.174:1981): pid=10428 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.625713 kernel: audit: type=1103 audit(1707473552.175:1982): pid=10430 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.175000 audit[10430]: CRED_ACQ pid=10430 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.714864 kernel: audit: type=1106 audit(1707473552.250:1983): pid=10428 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.250000 audit[10428]: USER_END pid=10428 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.810349 kernel: audit: type=1104 audit(1707473552.250:1984): pid=10428 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.250000 audit[10428]: CRED_DISP pid=10428 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.113:22-147.75.109.163:33896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:32.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.113:22-147.75.109.163:33902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:32.439000 audit[10454]: USER_ACCT pid=10454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.440000 audit[10454]: CRED_ACQ pid=10454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.440000 audit[10454]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd1fcda50 a2=3 a3=0 items=0 ppid=1 pid=10454 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:32.440000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:32.445000 audit[10454]: USER_START pid=10454 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:32.446000 audit[10456]: CRED_ACQ pid=10456 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:33.082388 sshd[10454]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:33.083000 audit[10454]: USER_END pid=10454 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:33.083000 audit[10454]: CRED_DISP pid=10454 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:33.091074 systemd[1]: sshd@49-139.178.90.113:22-147.75.109.163:33902.service: Deactivated successfully. Feb 9 10:12:33.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.113:22-147.75.109.163:33902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:33.093723 systemd[1]: session-46.scope: Deactivated successfully. Feb 9 10:12:33.095923 systemd-logind[1465]: Session 46 logged out. Waiting for processes to exit. Feb 9 10:12:33.099500 systemd[1]: Started sshd@50-139.178.90.113:22-147.75.109.163:33916.service. Feb 9 10:12:33.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.113:22-147.75.109.163:33916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:33.102132 systemd-logind[1465]: Removed session 46. Feb 9 10:12:33.158000 audit[10477]: USER_ACCT pid=10477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:33.160084 sshd[10477]: Accepted publickey for core from 147.75.109.163 port 33916 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:33.159000 audit[10477]: CRED_ACQ pid=10477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:33.159000 audit[10477]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff4edbc00 a2=3 a3=0 items=0 ppid=1 pid=10477 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:33.159000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:33.161113 sshd[10477]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:33.164864 systemd-logind[1465]: New session 47 of user core. Feb 9 10:12:33.165696 systemd[1]: Started session-47.scope. Feb 9 10:12:33.168000 audit[10477]: USER_START pid=10477 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:33.169000 audit[10479]: CRED_ACQ pid=10479 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:33.294944 sshd[10477]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:33.294000 audit[10477]: USER_END pid=10477 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:33.294000 audit[10477]: CRED_DISP pid=10477 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:33.296399 systemd[1]: sshd@50-139.178.90.113:22-147.75.109.163:33916.service: Deactivated successfully. Feb 9 10:12:33.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.113:22-147.75.109.163:33916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:33.296876 systemd[1]: session-47.scope: Deactivated successfully. Feb 9 10:12:33.297277 systemd-logind[1465]: Session 47 logged out. Waiting for processes to exit. Feb 9 10:12:33.297794 systemd-logind[1465]: Removed session 47. Feb 9 10:12:38.307075 systemd[1]: Started sshd@51-139.178.90.113:22-147.75.109.163:53694.service. Feb 9 10:12:38.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.113:22-147.75.109.163:53694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:38.334254 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 10:12:38.334327 kernel: audit: type=1130 audit(1707473558.306:2004): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.113:22-147.75.109.163:53694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:38.454000 audit[10521]: USER_ACCT pid=10521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:38.455758 sshd[10521]: Accepted publickey for core from 147.75.109.163 port 53694 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:38.459428 sshd[10521]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:38.469033 systemd-logind[1465]: New session 48 of user core. Feb 9 10:12:38.471241 systemd[1]: Started session-48.scope. Feb 9 10:12:38.458000 audit[10521]: CRED_ACQ pid=10521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:38.559825 sshd[10521]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:38.561261 systemd[1]: sshd@51-139.178.90.113:22-147.75.109.163:53694.service: Deactivated successfully. Feb 9 10:12:38.561742 systemd[1]: session-48.scope: Deactivated successfully. Feb 9 10:12:38.562136 systemd-logind[1465]: Session 48 logged out. Waiting for processes to exit. Feb 9 10:12:38.562534 systemd-logind[1465]: Removed session 48. Feb 9 10:12:38.638777 kernel: audit: type=1101 audit(1707473558.454:2005): pid=10521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:38.638817 kernel: audit: type=1103 audit(1707473558.458:2006): pid=10521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:38.638835 kernel: audit: type=1006 audit(1707473558.458:2007): pid=10521 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=48 res=1 Feb 9 10:12:38.697428 kernel: audit: type=1300 audit(1707473558.458:2007): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde7a9e530 a2=3 a3=0 items=0 ppid=1 pid=10521 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:38.458000 audit[10521]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde7a9e530 a2=3 a3=0 items=0 ppid=1 pid=10521 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:38.789405 kernel: audit: type=1327 audit(1707473558.458:2007): proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:38.458000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:38.819890 kernel: audit: type=1105 audit(1707473558.480:2008): pid=10521 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:38.480000 audit[10521]: USER_START pid=10521 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:38.914388 kernel: audit: type=1103 audit(1707473558.482:2009): pid=10523 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:38.482000 audit[10523]: CRED_ACQ pid=10523 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:39.003589 kernel: audit: type=1106 audit(1707473558.559:2010): pid=10521 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:38.559000 audit[10521]: USER_END pid=10521 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:39.099080 kernel: audit: type=1104 audit(1707473558.559:2011): pid=10521 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:38.559000 audit[10521]: CRED_DISP pid=10521 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:38.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.113:22-147.75.109.163:53694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:38.760000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:12:38.760000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002972ac0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:12:38.760000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:12:38.761000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:12:38.761000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0026a5890 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:12:38.761000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:12:38.814000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:12:38.814000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0149fd860 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:12:38.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:12:38.814000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:12:38.814000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0031fc900 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:12:38.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:12:38.814000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:12:38.814000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0114fad80 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:12:38.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:12:38.815000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:12:38.815000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00a6b0e10 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:12:38.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:12:38.817000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:12:38.817000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00f865a40 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:12:38.817000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:12:38.830000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:12:38.830000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0149fd8f0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:12:38.830000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:12:42.807000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:12:42.807000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000eae320 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:12:42.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:12:42.807000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:12:42.807000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000650180 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:12:42.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:12:42.807000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:12:42.807000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0030085a0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:12:42.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:12:42.807000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:12:42.807000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001673500 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:12:42.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:12:43.570306 systemd[1]: Started sshd@52-139.178.90.113:22-147.75.109.163:53698.service. Feb 9 10:12:43.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.113:22-147.75.109.163:53698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:43.597520 kernel: kauditd_printk_skb: 37 callbacks suppressed Feb 9 10:12:43.597569 kernel: audit: type=1130 audit(1707473563.568:2025): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.113:22-147.75.109.163:53698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:43.719000 audit[10593]: USER_ACCT pid=10593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:43.721024 sshd[10593]: Accepted publickey for core from 147.75.109.163 port 53698 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:43.721851 sshd[10593]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:43.723969 systemd-logind[1465]: New session 49 of user core. Feb 9 10:12:43.724483 systemd[1]: Started session-49.scope. Feb 9 10:12:43.805694 sshd[10593]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:43.807044 systemd[1]: sshd@52-139.178.90.113:22-147.75.109.163:53698.service: Deactivated successfully. Feb 9 10:12:43.807487 systemd[1]: session-49.scope: Deactivated successfully. Feb 9 10:12:43.807895 systemd-logind[1465]: Session 49 logged out. Waiting for processes to exit. Feb 9 10:12:43.808372 systemd-logind[1465]: Removed session 49. Feb 9 10:12:43.720000 audit[10593]: CRED_ACQ pid=10593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:43.902995 kernel: audit: type=1101 audit(1707473563.719:2026): pid=10593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:43.903036 kernel: audit: type=1103 audit(1707473563.720:2027): pid=10593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:43.903053 kernel: audit: type=1006 audit(1707473563.720:2028): pid=10593 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=49 res=1 Feb 9 10:12:43.961632 kernel: audit: type=1300 audit(1707473563.720:2028): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed8cc3320 a2=3 a3=0 items=0 ppid=1 pid=10593 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:43.720000 audit[10593]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed8cc3320 a2=3 a3=0 items=0 ppid=1 pid=10593 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:44.053696 kernel: audit: type=1327 audit(1707473563.720:2028): proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:43.720000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:44.084168 kernel: audit: type=1105 audit(1707473563.725:2029): pid=10593 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:43.725000 audit[10593]: USER_START pid=10593 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:44.178735 kernel: audit: type=1103 audit(1707473563.725:2030): pid=10595 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:43.725000 audit[10595]: CRED_ACQ pid=10595 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:44.267988 kernel: audit: type=1106 audit(1707473563.804:2031): pid=10593 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:43.804000 audit[10593]: USER_END pid=10593 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:44.363663 kernel: audit: type=1104 audit(1707473563.804:2032): pid=10593 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:43.804000 audit[10593]: CRED_DISP pid=10593 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:43.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.113:22-147.75.109.163:53698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:48.067000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:12:48.067000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001960cc0 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:12:48.067000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:12:48.135000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:12:48.135000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00193df60 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:12:48.135000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:12:48.815647 systemd[1]: Started sshd@53-139.178.90.113:22-147.75.109.163:49912.service. Feb 9 10:12:48.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.113:22-147.75.109.163:49912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:48.842611 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:12:48.842675 kernel: audit: type=1130 audit(1707473568.815:2036): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.113:22-147.75.109.163:49912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:48.965000 audit[10634]: USER_ACCT pid=10634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:48.965782 sshd[10634]: Accepted publickey for core from 147.75.109.163 port 49912 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:48.967665 sshd[10634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:48.970255 systemd-logind[1465]: New session 50 of user core. Feb 9 10:12:48.970778 systemd[1]: Started session-50.scope. Feb 9 10:12:48.966000 audit[10634]: CRED_ACQ pid=10634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:49.147783 kernel: audit: type=1101 audit(1707473568.965:2037): pid=10634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:49.147829 kernel: audit: type=1103 audit(1707473568.966:2038): pid=10634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:49.147846 kernel: audit: type=1006 audit(1707473568.966:2039): pid=10634 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=50 res=1 Feb 9 10:12:49.206436 kernel: audit: type=1300 audit(1707473568.966:2039): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff92f573d0 a2=3 a3=0 items=0 ppid=1 pid=10634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:48.966000 audit[10634]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff92f573d0 a2=3 a3=0 items=0 ppid=1 pid=10634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:49.298509 kernel: audit: type=1327 audit(1707473568.966:2039): proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:48.966000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:49.298757 sshd[10634]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:49.300219 systemd[1]: sshd@53-139.178.90.113:22-147.75.109.163:49912.service: Deactivated successfully. Feb 9 10:12:49.300656 systemd[1]: session-50.scope: Deactivated successfully. Feb 9 10:12:49.301054 systemd-logind[1465]: Session 50 logged out. Waiting for processes to exit. Feb 9 10:12:49.301748 systemd-logind[1465]: Removed session 50. Feb 9 10:12:49.329047 kernel: audit: type=1105 audit(1707473568.972:2040): pid=10634 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:48.972000 audit[10634]: USER_START pid=10634 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:49.423618 kernel: audit: type=1103 audit(1707473568.973:2041): pid=10636 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:48.973000 audit[10636]: CRED_ACQ pid=10636 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:49.298000 audit[10634]: USER_END pid=10634 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:49.608506 kernel: audit: type=1106 audit(1707473569.298:2042): pid=10634 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:49.608544 kernel: audit: type=1104 audit(1707473569.299:2043): pid=10634 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:49.299000 audit[10634]: CRED_DISP pid=10634 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:49.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.113:22-147.75.109.163:49912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:54.251251 systemd[1]: Started sshd@54-139.178.90.113:22-147.75.109.163:49916.service. Feb 9 10:12:54.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.113:22-147.75.109.163:49916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:54.278206 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:12:54.278300 kernel: audit: type=1130 audit(1707473574.250:2045): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.113:22-147.75.109.163:49916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:54.400000 audit[10699]: USER_ACCT pid=10699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:54.401382 sshd[10699]: Accepted publickey for core from 147.75.109.163 port 49916 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:54.402861 sshd[10699]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:54.405450 systemd-logind[1465]: New session 51 of user core. Feb 9 10:12:54.405942 systemd[1]: Started session-51.scope. Feb 9 10:12:54.483578 sshd[10699]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:54.485058 systemd[1]: sshd@54-139.178.90.113:22-147.75.109.163:49916.service: Deactivated successfully. Feb 9 10:12:54.485500 systemd[1]: session-51.scope: Deactivated successfully. Feb 9 10:12:54.485934 systemd-logind[1465]: Session 51 logged out. Waiting for processes to exit. Feb 9 10:12:54.486754 systemd-logind[1465]: Removed session 51. Feb 9 10:12:54.402000 audit[10699]: CRED_ACQ pid=10699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:54.583207 kernel: audit: type=1101 audit(1707473574.400:2046): pid=10699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:54.583246 kernel: audit: type=1103 audit(1707473574.402:2047): pid=10699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:54.583265 kernel: audit: type=1006 audit(1707473574.402:2048): pid=10699 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=51 res=1 Feb 9 10:12:54.641796 kernel: audit: type=1300 audit(1707473574.402:2048): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7fc80e60 a2=3 a3=0 items=0 ppid=1 pid=10699 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:54.402000 audit[10699]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7fc80e60 a2=3 a3=0 items=0 ppid=1 pid=10699 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:54.733870 kernel: audit: type=1327 audit(1707473574.402:2048): proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:54.402000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:54.764328 kernel: audit: type=1105 audit(1707473574.407:2049): pid=10699 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:54.407000 audit[10699]: USER_START pid=10699 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:54.858796 kernel: audit: type=1103 audit(1707473574.408:2050): pid=10703 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:54.408000 audit[10703]: CRED_ACQ pid=10703 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:54.948020 kernel: audit: type=1106 audit(1707473574.483:2051): pid=10699 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:54.483000 audit[10699]: USER_END pid=10699 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:55.043540 kernel: audit: type=1104 audit(1707473574.483:2052): pid=10699 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:54.483000 audit[10699]: CRED_DISP pid=10699 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:54.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.113:22-147.75.109.163:49916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:59.493852 systemd[1]: Started sshd@55-139.178.90.113:22-147.75.109.163:39140.service. Feb 9 10:12:59.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.113:22-147.75.109.163:39140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:59.521068 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:12:59.521152 kernel: audit: type=1130 audit(1707473579.492:2054): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.113:22-147.75.109.163:39140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:12:59.641000 audit[10729]: USER_ACCT pid=10729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:59.643595 sshd[10729]: Accepted publickey for core from 147.75.109.163 port 39140 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:12:59.644859 sshd[10729]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:12:59.647324 systemd-logind[1465]: New session 52 of user core. Feb 9 10:12:59.647896 systemd[1]: Started session-52.scope. Feb 9 10:12:59.727080 sshd[10729]: pam_unix(sshd:session): session closed for user core Feb 9 10:12:59.728509 systemd[1]: sshd@55-139.178.90.113:22-147.75.109.163:39140.service: Deactivated successfully. Feb 9 10:12:59.728942 systemd[1]: session-52.scope: Deactivated successfully. Feb 9 10:12:59.729292 systemd-logind[1465]: Session 52 logged out. Waiting for processes to exit. Feb 9 10:12:59.730014 systemd-logind[1465]: Removed session 52. Feb 9 10:12:59.643000 audit[10729]: CRED_ACQ pid=10729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:59.825951 kernel: audit: type=1101 audit(1707473579.641:2055): pid=10729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:59.825997 kernel: audit: type=1103 audit(1707473579.643:2056): pid=10729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:59.826018 kernel: audit: type=1006 audit(1707473579.643:2057): pid=10729 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=52 res=1 Feb 9 10:12:59.884576 kernel: audit: type=1300 audit(1707473579.643:2057): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb71987c0 a2=3 a3=0 items=0 ppid=1 pid=10729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:59.643000 audit[10729]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb71987c0 a2=3 a3=0 items=0 ppid=1 pid=10729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:12:59.976635 kernel: audit: type=1327 audit(1707473579.643:2057): proctitle=737368643A20636F7265205B707269765D Feb 9 10:12:59.643000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:00.007084 kernel: audit: type=1105 audit(1707473579.648:2058): pid=10729 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:59.648000 audit[10729]: USER_START pid=10729 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:00.101624 kernel: audit: type=1103 audit(1707473579.649:2059): pid=10731 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:59.649000 audit[10731]: CRED_ACQ pid=10731 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:00.190807 kernel: audit: type=1106 audit(1707473579.726:2060): pid=10729 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:59.726000 audit[10729]: USER_END pid=10729 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:00.286304 kernel: audit: type=1104 audit(1707473579.726:2061): pid=10729 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:59.726000 audit[10729]: CRED_DISP pid=10729 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:12:59.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.113:22-147.75.109.163:39140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:04.737927 systemd[1]: Started sshd@56-139.178.90.113:22-147.75.109.163:53274.service. Feb 9 10:13:04.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.113:22-147.75.109.163:53274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:04.765066 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:13:04.765151 kernel: audit: type=1130 audit(1707473584.737:2063): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.113:22-147.75.109.163:53274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:04.887000 audit[10755]: USER_ACCT pid=10755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:04.888079 sshd[10755]: Accepted publickey for core from 147.75.109.163 port 53274 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:13:04.889367 sshd[10755]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:13:04.891910 systemd-logind[1465]: New session 53 of user core. Feb 9 10:13:04.892389 systemd[1]: Started session-53.scope. Feb 9 10:13:04.971651 sshd[10755]: pam_unix(sshd:session): session closed for user core Feb 9 10:13:04.973183 systemd[1]: sshd@56-139.178.90.113:22-147.75.109.163:53274.service: Deactivated successfully. Feb 9 10:13:04.973628 systemd[1]: session-53.scope: Deactivated successfully. Feb 9 10:13:04.974009 systemd-logind[1465]: Session 53 logged out. Waiting for processes to exit. Feb 9 10:13:04.974828 systemd-logind[1465]: Removed session 53. Feb 9 10:13:04.888000 audit[10755]: CRED_ACQ pid=10755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:05.069917 kernel: audit: type=1101 audit(1707473584.887:2064): pid=10755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:05.069961 kernel: audit: type=1103 audit(1707473584.888:2065): pid=10755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:05.069981 kernel: audit: type=1006 audit(1707473584.888:2066): pid=10755 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=53 res=1 Feb 9 10:13:05.128542 kernel: audit: type=1300 audit(1707473584.888:2066): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff076b4b90 a2=3 a3=0 items=0 ppid=1 pid=10755 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:04.888000 audit[10755]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff076b4b90 a2=3 a3=0 items=0 ppid=1 pid=10755 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:05.220557 kernel: audit: type=1327 audit(1707473584.888:2066): proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:04.888000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:05.250996 kernel: audit: type=1105 audit(1707473584.894:2067): pid=10755 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:04.894000 audit[10755]: USER_START pid=10755 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:05.345477 kernel: audit: type=1103 audit(1707473584.894:2068): pid=10757 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:04.894000 audit[10757]: CRED_ACQ pid=10757 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:05.434655 kernel: audit: type=1106 audit(1707473584.971:2069): pid=10755 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:04.971000 audit[10755]: USER_END pid=10755 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:05.530157 kernel: audit: type=1104 audit(1707473584.971:2070): pid=10755 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:04.971000 audit[10755]: CRED_DISP pid=10755 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:04.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.113:22-147.75.109.163:53274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:09.981318 systemd[1]: Started sshd@57-139.178.90.113:22-147.75.109.163:53278.service. Feb 9 10:13:09.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.113:22-147.75.109.163:53278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:10.008272 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:13:10.008367 kernel: audit: type=1130 audit(1707473589.979:2072): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.113:22-147.75.109.163:53278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:10.129000 audit[10780]: USER_ACCT pid=10780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:10.131155 sshd[10780]: Accepted publickey for core from 147.75.109.163 port 53278 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:13:10.131759 sshd[10780]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:13:10.133833 systemd-logind[1465]: New session 54 of user core. Feb 9 10:13:10.134355 systemd[1]: Started session-54.scope. Feb 9 10:13:10.213470 sshd[10780]: pam_unix(sshd:session): session closed for user core Feb 9 10:13:10.214961 systemd[1]: sshd@57-139.178.90.113:22-147.75.109.163:53278.service: Deactivated successfully. Feb 9 10:13:10.215401 systemd[1]: session-54.scope: Deactivated successfully. Feb 9 10:13:10.215769 systemd-logind[1465]: Session 54 logged out. Waiting for processes to exit. Feb 9 10:13:10.216246 systemd-logind[1465]: Removed session 54. Feb 9 10:13:10.130000 audit[10780]: CRED_ACQ pid=10780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:10.312908 kernel: audit: type=1101 audit(1707473590.129:2073): pid=10780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:10.312947 kernel: audit: type=1103 audit(1707473590.130:2074): pid=10780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:10.312965 kernel: audit: type=1006 audit(1707473590.130:2075): pid=10780 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=54 res=1 Feb 9 10:13:10.371490 kernel: audit: type=1300 audit(1707473590.130:2075): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc18c18d0 a2=3 a3=0 items=0 ppid=1 pid=10780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:10.130000 audit[10780]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc18c18d0 a2=3 a3=0 items=0 ppid=1 pid=10780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:10.463438 kernel: audit: type=1327 audit(1707473590.130:2075): proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:10.130000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:10.493897 kernel: audit: type=1105 audit(1707473590.134:2076): pid=10780 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:10.134000 audit[10780]: USER_START pid=10780 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:10.588319 kernel: audit: type=1103 audit(1707473590.135:2077): pid=10782 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:10.135000 audit[10782]: CRED_ACQ pid=10782 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:10.677482 kernel: audit: type=1106 audit(1707473590.212:2078): pid=10780 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:10.212000 audit[10780]: USER_END pid=10780 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:10.772931 kernel: audit: type=1104 audit(1707473590.212:2079): pid=10780 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:10.212000 audit[10780]: CRED_DISP pid=10780 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:10.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.113:22-147.75.109.163:53278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:15.216513 systemd[1]: Started sshd@58-139.178.90.113:22-147.75.109.163:37444.service. Feb 9 10:13:15.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.113:22-147.75.109.163:37444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:15.243531 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:13:15.243589 kernel: audit: type=1130 audit(1707473595.216:2081): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.113:22-147.75.109.163:37444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:15.382000 audit[10852]: USER_ACCT pid=10852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:15.383581 sshd[10852]: Accepted publickey for core from 147.75.109.163 port 37444 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:13:15.386568 sshd[10852]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:13:15.394106 systemd-logind[1465]: New session 55 of user core. Feb 9 10:13:15.395499 systemd[1]: Started session-55.scope. Feb 9 10:13:15.385000 audit[10852]: CRED_ACQ pid=10852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:15.479414 sshd[10852]: pam_unix(sshd:session): session closed for user core Feb 9 10:13:15.480848 systemd[1]: sshd@58-139.178.90.113:22-147.75.109.163:37444.service: Deactivated successfully. Feb 9 10:13:15.481283 systemd[1]: session-55.scope: Deactivated successfully. Feb 9 10:13:15.481587 systemd-logind[1465]: Session 55 logged out. Waiting for processes to exit. Feb 9 10:13:15.482303 systemd-logind[1465]: Removed session 55. Feb 9 10:13:15.565141 kernel: audit: type=1101 audit(1707473595.382:2082): pid=10852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:15.565178 kernel: audit: type=1103 audit(1707473595.385:2083): pid=10852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:15.565197 kernel: audit: type=1006 audit(1707473595.385:2084): pid=10852 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=55 res=1 Feb 9 10:13:15.385000 audit[10852]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce0376630 a2=3 a3=0 items=0 ppid=1 pid=10852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:15.716341 kernel: audit: type=1300 audit(1707473595.385:2084): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce0376630 a2=3 a3=0 items=0 ppid=1 pid=10852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:15.716375 kernel: audit: type=1327 audit(1707473595.385:2084): proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:15.385000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:15.746812 kernel: audit: type=1105 audit(1707473595.401:2085): pid=10852 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:15.401000 audit[10852]: USER_START pid=10852 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:15.841258 kernel: audit: type=1103 audit(1707473595.402:2086): pid=10854 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:15.402000 audit[10854]: CRED_ACQ pid=10854 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:15.930461 kernel: audit: type=1106 audit(1707473595.479:2087): pid=10852 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:15.479000 audit[10852]: USER_END pid=10852 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:16.026025 kernel: audit: type=1104 audit(1707473595.479:2088): pid=10852 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:15.479000 audit[10852]: CRED_DISP pid=10852 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:15.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.113:22-147.75.109.163:37444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:20.489644 systemd[1]: Started sshd@59-139.178.90.113:22-147.75.109.163:37450.service. Feb 9 10:13:20.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.113:22-147.75.109.163:37450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:20.516695 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:13:20.516777 kernel: audit: type=1130 audit(1707473600.489:2090): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.113:22-147.75.109.163:37450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:20.638000 audit[10878]: USER_ACCT pid=10878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:20.639132 sshd[10878]: Accepted publickey for core from 147.75.109.163 port 37450 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:13:20.639870 sshd[10878]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:13:20.642244 systemd-logind[1465]: New session 56 of user core. Feb 9 10:13:20.642764 systemd[1]: Started session-56.scope. Feb 9 10:13:20.721120 sshd[10878]: pam_unix(sshd:session): session closed for user core Feb 9 10:13:20.722638 systemd[1]: sshd@59-139.178.90.113:22-147.75.109.163:37450.service: Deactivated successfully. Feb 9 10:13:20.723077 systemd[1]: session-56.scope: Deactivated successfully. Feb 9 10:13:20.723825 systemd-logind[1465]: Session 56 logged out. Waiting for processes to exit. Feb 9 10:13:20.724908 systemd-logind[1465]: Removed session 56. Feb 9 10:13:20.639000 audit[10878]: CRED_ACQ pid=10878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:20.821081 kernel: audit: type=1101 audit(1707473600.638:2091): pid=10878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:20.821125 kernel: audit: type=1103 audit(1707473600.639:2092): pid=10878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:20.821143 kernel: audit: type=1006 audit(1707473600.639:2093): pid=10878 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=56 res=1 Feb 9 10:13:20.639000 audit[10878]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd258910a0 a2=3 a3=0 items=0 ppid=1 pid=10878 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:20.971627 kernel: audit: type=1300 audit(1707473600.639:2093): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd258910a0 a2=3 a3=0 items=0 ppid=1 pid=10878 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:20.971663 kernel: audit: type=1327 audit(1707473600.639:2093): proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:20.639000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:21.002124 kernel: audit: type=1105 audit(1707473600.644:2094): pid=10878 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:20.644000 audit[10878]: USER_START pid=10878 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:21.096723 kernel: audit: type=1103 audit(1707473600.645:2095): pid=10880 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:20.645000 audit[10880]: CRED_ACQ pid=10880 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:21.185978 kernel: audit: type=1106 audit(1707473600.721:2096): pid=10878 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:20.721000 audit[10878]: USER_END pid=10878 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:21.281497 kernel: audit: type=1104 audit(1707473600.721:2097): pid=10878 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:20.721000 audit[10878]: CRED_DISP pid=10878 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:20.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.113:22-147.75.109.163:37450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:25.730845 systemd[1]: Started sshd@60-139.178.90.113:22-147.75.109.163:40542.service. Feb 9 10:13:25.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.113:22-147.75.109.163:40542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:25.758040 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:13:25.758098 kernel: audit: type=1130 audit(1707473605.730:2099): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.113:22-147.75.109.163:40542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:25.880000 audit[10940]: USER_ACCT pid=10940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:25.881629 sshd[10940]: Accepted publickey for core from 147.75.109.163 port 40542 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:13:25.884976 sshd[10940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:13:25.894592 systemd-logind[1465]: New session 57 of user core. Feb 9 10:13:25.896274 systemd[1]: Started session-57.scope. Feb 9 10:13:25.883000 audit[10940]: CRED_ACQ pid=10940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:25.981929 sshd[10940]: pam_unix(sshd:session): session closed for user core Feb 9 10:13:25.983326 systemd[1]: sshd@60-139.178.90.113:22-147.75.109.163:40542.service: Deactivated successfully. Feb 9 10:13:25.983765 systemd[1]: session-57.scope: Deactivated successfully. Feb 9 10:13:25.984148 systemd-logind[1465]: Session 57 logged out. Waiting for processes to exit. Feb 9 10:13:25.984559 systemd-logind[1465]: Removed session 57. Feb 9 10:13:26.064762 kernel: audit: type=1101 audit(1707473605.880:2100): pid=10940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:26.064800 kernel: audit: type=1103 audit(1707473605.883:2101): pid=10940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:26.064817 kernel: audit: type=1006 audit(1707473605.883:2102): pid=10940 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=57 res=1 Feb 9 10:13:25.883000 audit[10940]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc40155af0 a2=3 a3=0 items=0 ppid=1 pid=10940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:26.215445 kernel: audit: type=1300 audit(1707473605.883:2102): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc40155af0 a2=3 a3=0 items=0 ppid=1 pid=10940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:26.215479 kernel: audit: type=1327 audit(1707473605.883:2102): proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:25.883000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:26.245915 kernel: audit: type=1105 audit(1707473605.903:2103): pid=10940 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:25.903000 audit[10940]: USER_START pid=10940 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:26.340408 kernel: audit: type=1103 audit(1707473605.904:2104): pid=10942 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:25.904000 audit[10942]: CRED_ACQ pid=10942 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:26.429637 kernel: audit: type=1106 audit(1707473605.982:2105): pid=10940 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:25.982000 audit[10940]: USER_END pid=10940 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:26.525195 kernel: audit: type=1104 audit(1707473605.982:2106): pid=10940 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:25.982000 audit[10940]: CRED_DISP pid=10940 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:25.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.113:22-147.75.109.163:40542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:30.990472 systemd[1]: Started sshd@61-139.178.90.113:22-147.75.109.163:40544.service. Feb 9 10:13:30.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.113:22-147.75.109.163:40544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:31.017608 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:13:31.017676 kernel: audit: type=1130 audit(1707473610.989:2108): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.113:22-147.75.109.163:40544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:31.138000 audit[10967]: USER_ACCT pid=10967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:31.139839 sshd[10967]: Accepted publickey for core from 147.75.109.163 port 40544 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:13:31.141868 sshd[10967]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:13:31.144319 systemd-logind[1465]: New session 58 of user core. Feb 9 10:13:31.144880 systemd[1]: Started session-58.scope. Feb 9 10:13:31.222913 sshd[10967]: pam_unix(sshd:session): session closed for user core Feb 9 10:13:31.224271 systemd[1]: sshd@61-139.178.90.113:22-147.75.109.163:40544.service: Deactivated successfully. Feb 9 10:13:31.224711 systemd[1]: session-58.scope: Deactivated successfully. Feb 9 10:13:31.225077 systemd-logind[1465]: Session 58 logged out. Waiting for processes to exit. Feb 9 10:13:31.225478 systemd-logind[1465]: Removed session 58. Feb 9 10:13:31.140000 audit[10967]: CRED_ACQ pid=10967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:31.321638 kernel: audit: type=1101 audit(1707473611.138:2109): pid=10967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:31.321675 kernel: audit: type=1103 audit(1707473611.140:2110): pid=10967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:31.321695 kernel: audit: type=1006 audit(1707473611.140:2111): pid=10967 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=58 res=1 Feb 9 10:13:31.380264 kernel: audit: type=1300 audit(1707473611.140:2111): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddc4ae1a0 a2=3 a3=0 items=0 ppid=1 pid=10967 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:31.140000 audit[10967]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddc4ae1a0 a2=3 a3=0 items=0 ppid=1 pid=10967 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:31.472279 kernel: audit: type=1327 audit(1707473611.140:2111): proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:31.140000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:31.502725 kernel: audit: type=1105 audit(1707473611.145:2112): pid=10967 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:31.145000 audit[10967]: USER_START pid=10967 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:31.597205 kernel: audit: type=1103 audit(1707473611.145:2113): pid=10969 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:31.145000 audit[10969]: CRED_ACQ pid=10969 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:31.686442 kernel: audit: type=1106 audit(1707473611.221:2114): pid=10967 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:31.221000 audit[10967]: USER_END pid=10967 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:31.222000 audit[10967]: CRED_DISP pid=10967 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:31.871269 kernel: audit: type=1104 audit(1707473611.222:2115): pid=10967 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:31.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.113:22-147.75.109.163:40544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:36.231833 systemd[1]: Started sshd@62-139.178.90.113:22-147.75.109.163:49490.service. Feb 9 10:13:36.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.113:22-147.75.109.163:49490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:36.258777 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:13:36.258847 kernel: audit: type=1130 audit(1707473616.231:2117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.113:22-147.75.109.163:49490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:36.390000 audit[10991]: USER_ACCT pid=10991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:36.390915 sshd[10991]: Accepted publickey for core from 147.75.109.163 port 49490 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:13:36.393902 sshd[10991]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:13:36.397093 systemd-logind[1465]: New session 59 of user core. Feb 9 10:13:36.397796 systemd[1]: Started session-59.scope. Feb 9 10:13:36.476917 sshd[10991]: pam_unix(sshd:session): session closed for user core Feb 9 10:13:36.478349 systemd[1]: sshd@62-139.178.90.113:22-147.75.109.163:49490.service: Deactivated successfully. Feb 9 10:13:36.478793 systemd[1]: session-59.scope: Deactivated successfully. Feb 9 10:13:36.479233 systemd-logind[1465]: Session 59 logged out. Waiting for processes to exit. Feb 9 10:13:36.479772 systemd-logind[1465]: Removed session 59. Feb 9 10:13:36.393000 audit[10991]: CRED_ACQ pid=10991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:36.574481 kernel: audit: type=1101 audit(1707473616.390:2118): pid=10991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:36.574531 kernel: audit: type=1103 audit(1707473616.393:2119): pid=10991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:36.574554 kernel: audit: type=1006 audit(1707473616.393:2120): pid=10991 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=59 res=1 Feb 9 10:13:36.633093 kernel: audit: type=1300 audit(1707473616.393:2120): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc75596b90 a2=3 a3=0 items=0 ppid=1 pid=10991 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:36.393000 audit[10991]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc75596b90 a2=3 a3=0 items=0 ppid=1 pid=10991 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:36.725153 kernel: audit: type=1327 audit(1707473616.393:2120): proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:36.393000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:36.755635 kernel: audit: type=1105 audit(1707473616.400:2121): pid=10991 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:36.400000 audit[10991]: USER_START pid=10991 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:36.850142 kernel: audit: type=1103 audit(1707473616.400:2122): pid=10993 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:36.400000 audit[10993]: CRED_ACQ pid=10993 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:36.939434 kernel: audit: type=1106 audit(1707473616.477:2123): pid=10991 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:36.477000 audit[10991]: USER_END pid=10991 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:37.035099 kernel: audit: type=1104 audit(1707473616.477:2124): pid=10991 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:36.477000 audit[10991]: CRED_DISP pid=10991 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:36.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.113:22-147.75.109.163:49490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:38.760000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:13:38.760000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c8a8a0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:13:38.760000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:13:38.761000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:13:38.761000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00248d6a0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:13:38.761000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:13:38.814000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:13:38.814000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01d240ba0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:13:38.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:13:38.814000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:13:38.814000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01174e140 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:13:38.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:13:38.814000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:13:38.814000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00464b8c0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:13:38.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:13:38.814000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:13:38.814000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01d09bb90 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:13:38.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:13:38.816000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:13:38.816000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00c3faee0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:13:38.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:13:38.830000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:13:38.830000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01d240cc0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:13:38.830000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:13:41.486084 systemd[1]: Started sshd@63-139.178.90.113:22-147.75.109.163:49502.service. Feb 9 10:13:41.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.113:22-147.75.109.163:49502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:41.513302 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:13:41.513367 kernel: audit: type=1130 audit(1707473621.485:2134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.113:22-147.75.109.163:49502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:41.635000 audit[11037]: USER_ACCT pid=11037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:41.636161 sshd[11037]: Accepted publickey for core from 147.75.109.163 port 49502 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:13:41.636872 sshd[11037]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:13:41.638996 systemd-logind[1465]: New session 60 of user core. Feb 9 10:13:41.639529 systemd[1]: Started session-60.scope. Feb 9 10:13:41.728089 sshd[11037]: pam_unix(sshd:session): session closed for user core Feb 9 10:13:41.729429 systemd[1]: sshd@63-139.178.90.113:22-147.75.109.163:49502.service: Deactivated successfully. Feb 9 10:13:41.729625 kernel: audit: type=1101 audit(1707473621.635:2135): pid=11037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:41.729699 kernel: audit: type=1103 audit(1707473621.636:2136): pid=11037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:41.636000 audit[11037]: CRED_ACQ pid=11037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:41.729923 systemd[1]: session-60.scope: Deactivated successfully. Feb 9 10:13:41.730297 systemd-logind[1465]: Session 60 logged out. Waiting for processes to exit. Feb 9 10:13:41.730905 systemd-logind[1465]: Removed session 60. Feb 9 10:13:41.879672 kernel: audit: type=1006 audit(1707473621.636:2137): pid=11037 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=60 res=1 Feb 9 10:13:41.879772 kernel: audit: type=1300 audit(1707473621.636:2137): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff49b34d70 a2=3 a3=0 items=0 ppid=1 pid=11037 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:41.636000 audit[11037]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff49b34d70 a2=3 a3=0 items=0 ppid=1 pid=11037 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:41.636000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:42.002239 kernel: audit: type=1327 audit(1707473621.636:2137): proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:42.002298 kernel: audit: type=1105 audit(1707473621.641:2138): pid=11037 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:41.641000 audit[11037]: USER_START pid=11037 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:41.641000 audit[11039]: CRED_ACQ pid=11039 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:42.097627 kernel: audit: type=1103 audit(1707473621.641:2139): pid=11039 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:41.728000 audit[11037]: USER_END pid=11037 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:42.281738 kernel: audit: type=1106 audit(1707473621.728:2140): pid=11037 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:42.281779 kernel: audit: type=1104 audit(1707473621.728:2141): pid=11037 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:41.728000 audit[11037]: CRED_DISP pid=11037 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:41.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.113:22-147.75.109.163:49502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:42.808000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:13:42.808000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00186b660 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:13:42.808000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:13:42.809000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:13:42.809000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0005b3a60 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:13:42.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:13:42.809000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:13:42.809000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0005b3aa0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:13:42.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:13:42.809000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:13:42.809000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c002d5fa60 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:13:42.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:13:46.737065 systemd[1]: Started sshd@64-139.178.90.113:22-147.75.109.163:42024.service. Feb 9 10:13:46.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.113:22-147.75.109.163:42024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:46.764235 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:13:46.764292 kernel: audit: type=1130 audit(1707473626.735:2147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.113:22-147.75.109.163:42024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:46.885000 audit[11117]: USER_ACCT pid=11117 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:46.887032 sshd[11117]: Accepted publickey for core from 147.75.109.163 port 42024 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:13:46.889545 sshd[11117]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:13:46.891827 systemd-logind[1465]: New session 61 of user core. Feb 9 10:13:46.892362 systemd[1]: Started session-61.scope. Feb 9 10:13:46.887000 audit[11117]: CRED_ACQ pid=11117 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:47.070724 kernel: audit: type=1101 audit(1707473626.885:2148): pid=11117 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:47.070768 kernel: audit: type=1103 audit(1707473626.887:2149): pid=11117 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:47.070789 kernel: audit: type=1006 audit(1707473626.887:2150): pid=11117 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=61 res=1 Feb 9 10:13:47.129456 kernel: audit: type=1300 audit(1707473626.887:2150): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed762f7e0 a2=3 a3=0 items=0 ppid=1 pid=11117 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:46.887000 audit[11117]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed762f7e0 a2=3 a3=0 items=0 ppid=1 pid=11117 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:47.221508 kernel: audit: type=1327 audit(1707473626.887:2150): proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:46.887000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:47.221738 sshd[11117]: pam_unix(sshd:session): session closed for user core Feb 9 10:13:47.223075 systemd[1]: sshd@64-139.178.90.113:22-147.75.109.163:42024.service: Deactivated successfully. Feb 9 10:13:47.223510 systemd[1]: session-61.scope: Deactivated successfully. Feb 9 10:13:47.223915 systemd-logind[1465]: Session 61 logged out. Waiting for processes to exit. Feb 9 10:13:47.224417 systemd-logind[1465]: Removed session 61. Feb 9 10:13:47.251994 kernel: audit: type=1105 audit(1707473626.892:2151): pid=11117 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:46.892000 audit[11117]: USER_START pid=11117 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:47.346513 kernel: audit: type=1103 audit(1707473626.893:2152): pid=11119 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:46.893000 audit[11119]: CRED_ACQ pid=11119 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:47.435724 kernel: audit: type=1106 audit(1707473627.220:2153): pid=11117 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:47.220000 audit[11117]: USER_END pid=11117 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:47.531231 kernel: audit: type=1104 audit(1707473627.220:2154): pid=11117 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:47.220000 audit[11117]: CRED_DISP pid=11117 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:47.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.113:22-147.75.109.163:42024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:48.067000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:13:48.067000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001befce0 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:13:48.067000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:13:48.136000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:13:48.136000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a5f980 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:13:48.136000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:13:52.167934 systemd[1]: Started sshd@65-139.178.90.113:22-147.75.109.163:42032.service. Feb 9 10:13:52.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.113:22-147.75.109.163:42032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:52.195006 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:13:52.195081 kernel: audit: type=1130 audit(1707473632.167:2158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.113:22-147.75.109.163:42032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:52.316000 audit[11143]: USER_ACCT pid=11143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:52.317272 sshd[11143]: Accepted publickey for core from 147.75.109.163 port 42032 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:13:52.318421 sshd[11143]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:13:52.320612 systemd-logind[1465]: New session 62 of user core. Feb 9 10:13:52.321138 systemd[1]: Started session-62.scope. Feb 9 10:13:52.401328 sshd[11143]: pam_unix(sshd:session): session closed for user core Feb 9 10:13:52.402798 systemd[1]: sshd@65-139.178.90.113:22-147.75.109.163:42032.service: Deactivated successfully. Feb 9 10:13:52.403236 systemd[1]: session-62.scope: Deactivated successfully. Feb 9 10:13:52.403529 systemd-logind[1465]: Session 62 logged out. Waiting for processes to exit. Feb 9 10:13:52.404067 systemd-logind[1465]: Removed session 62. Feb 9 10:13:52.408627 kernel: audit: type=1101 audit(1707473632.316:2159): pid=11143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:52.408666 kernel: audit: type=1103 audit(1707473632.317:2160): pid=11143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:52.317000 audit[11143]: CRED_ACQ pid=11143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:52.557796 kernel: audit: type=1006 audit(1707473632.317:2161): pid=11143 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=62 res=1 Feb 9 10:13:52.557831 kernel: audit: type=1300 audit(1707473632.317:2161): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb4ebe8c0 a2=3 a3=0 items=0 ppid=1 pid=11143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:52.317000 audit[11143]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb4ebe8c0 a2=3 a3=0 items=0 ppid=1 pid=11143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:52.649803 kernel: audit: type=1327 audit(1707473632.317:2161): proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:52.317000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:52.322000 audit[11143]: USER_START pid=11143 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:52.680556 kernel: audit: type=1105 audit(1707473632.322:2162): pid=11143 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:52.322000 audit[11183]: CRED_ACQ pid=11183 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:52.775617 kernel: audit: type=1103 audit(1707473632.322:2163): pid=11183 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:52.401000 audit[11143]: USER_END pid=11143 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:52.959487 kernel: audit: type=1106 audit(1707473632.401:2164): pid=11143 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:52.959521 kernel: audit: type=1104 audit(1707473632.401:2165): pid=11143 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:52.401000 audit[11143]: CRED_DISP pid=11143 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:52.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.113:22-147.75.109.163:42032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:57.413256 systemd[1]: Started sshd@66-139.178.90.113:22-147.75.109.163:45852.service. Feb 9 10:13:57.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.113:22-147.75.109.163:45852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:57.440817 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:13:57.440918 kernel: audit: type=1130 audit(1707473637.412:2167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.113:22-147.75.109.163:45852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:57.562525 sshd[11206]: Accepted publickey for core from 147.75.109.163 port 45852 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:13:57.560000 audit[11206]: USER_ACCT pid=11206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:57.564417 sshd[11206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:13:57.566945 systemd-logind[1465]: New session 63 of user core. Feb 9 10:13:57.567482 systemd[1]: Started session-63.scope. Feb 9 10:13:57.655771 sshd[11206]: pam_unix(sshd:session): session closed for user core Feb 9 10:13:57.562000 audit[11206]: CRED_ACQ pid=11206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:57.657232 systemd[1]: sshd@66-139.178.90.113:22-147.75.109.163:45852.service: Deactivated successfully. Feb 9 10:13:57.657717 systemd[1]: session-63.scope: Deactivated successfully. Feb 9 10:13:57.658154 systemd-logind[1465]: Session 63 logged out. Waiting for processes to exit. Feb 9 10:13:57.658598 systemd-logind[1465]: Removed session 63. Feb 9 10:13:57.746641 kernel: audit: type=1101 audit(1707473637.560:2168): pid=11206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:57.746681 kernel: audit: type=1103 audit(1707473637.562:2169): pid=11206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:57.746699 kernel: audit: type=1006 audit(1707473637.562:2170): pid=11206 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=63 res=1 Feb 9 10:13:57.805220 kernel: audit: type=1300 audit(1707473637.562:2170): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5b07ace0 a2=3 a3=0 items=0 ppid=1 pid=11206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:57.562000 audit[11206]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5b07ace0 a2=3 a3=0 items=0 ppid=1 pid=11206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:57.897236 kernel: audit: type=1327 audit(1707473637.562:2170): proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:57.562000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:13:57.927709 kernel: audit: type=1105 audit(1707473637.567:2171): pid=11206 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:57.567000 audit[11206]: USER_START pid=11206 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:58.022221 kernel: audit: type=1103 audit(1707473637.568:2172): pid=11208 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:57.568000 audit[11208]: CRED_ACQ pid=11208 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:58.111483 kernel: audit: type=1106 audit(1707473637.654:2173): pid=11206 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:57.654000 audit[11206]: USER_END pid=11206 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:58.207029 kernel: audit: type=1104 audit(1707473637.654:2174): pid=11206 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:57.654000 audit[11206]: CRED_DISP pid=11206 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:13:57.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.113:22-147.75.109.163:45852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:02.667297 systemd[1]: Started sshd@67-139.178.90.113:22-147.75.109.163:45854.service. Feb 9 10:14:02.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.113:22-147.75.109.163:45854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:02.694242 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:14:02.694285 kernel: audit: type=1130 audit(1707473642.667:2176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.113:22-147.75.109.163:45854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:02.846000 audit[11234]: USER_ACCT pid=11234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:02.847294 sshd[11234]: Accepted publickey for core from 147.75.109.163 port 45854 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:14:02.851261 sshd[11234]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:02.860822 systemd-logind[1465]: New session 64 of user core. Feb 9 10:14:02.863250 systemd[1]: Started session-64.scope. Feb 9 10:14:02.849000 audit[11234]: CRED_ACQ pid=11234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:02.954601 sshd[11234]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:02.956113 systemd[1]: sshd@67-139.178.90.113:22-147.75.109.163:45854.service: Deactivated successfully. Feb 9 10:14:02.956567 systemd[1]: session-64.scope: Deactivated successfully. Feb 9 10:14:02.956981 systemd-logind[1465]: Session 64 logged out. Waiting for processes to exit. Feb 9 10:14:02.957481 systemd-logind[1465]: Removed session 64. Feb 9 10:14:03.030254 kernel: audit: type=1101 audit(1707473642.846:2177): pid=11234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:03.030297 kernel: audit: type=1103 audit(1707473642.849:2178): pid=11234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:03.030312 kernel: audit: type=1006 audit(1707473642.849:2179): pid=11234 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=64 res=1 Feb 9 10:14:03.088940 kernel: audit: type=1300 audit(1707473642.849:2179): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb030eed0 a2=3 a3=0 items=0 ppid=1 pid=11234 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:02.849000 audit[11234]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb030eed0 a2=3 a3=0 items=0 ppid=1 pid=11234 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:03.181009 kernel: audit: type=1327 audit(1707473642.849:2179): proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:02.849000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:03.211506 kernel: audit: type=1105 audit(1707473642.874:2180): pid=11234 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:02.874000 audit[11234]: USER_START pid=11234 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:03.306047 kernel: audit: type=1103 audit(1707473642.876:2181): pid=11238 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:02.876000 audit[11238]: CRED_ACQ pid=11238 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:03.395455 kernel: audit: type=1106 audit(1707473642.954:2182): pid=11234 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:02.954000 audit[11234]: USER_END pid=11234 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:03.491027 kernel: audit: type=1104 audit(1707473642.954:2183): pid=11234 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:02.954000 audit[11234]: CRED_DISP pid=11234 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:02.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.113:22-147.75.109.163:45854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:07.963853 systemd[1]: Started sshd@68-139.178.90.113:22-147.75.109.163:54238.service. Feb 9 10:14:07.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.113:22-147.75.109.163:54238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:07.990623 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:14:07.990784 kernel: audit: type=1130 audit(1707473647.962:2185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.113:22-147.75.109.163:54238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:08.113091 sshd[11262]: Accepted publickey for core from 147.75.109.163 port 54238 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:14:08.111000 audit[11262]: USER_ACCT pid=11262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:08.113851 sshd[11262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:08.116268 systemd-logind[1465]: New session 65 of user core. Feb 9 10:14:08.116737 systemd[1]: Started session-65.scope. Feb 9 10:14:08.200961 sshd[11262]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:08.202331 systemd[1]: sshd@68-139.178.90.113:22-147.75.109.163:54238.service: Deactivated successfully. Feb 9 10:14:08.202773 systemd[1]: session-65.scope: Deactivated successfully. Feb 9 10:14:08.203179 systemd-logind[1465]: Session 65 logged out. Waiting for processes to exit. Feb 9 10:14:08.203636 systemd-logind[1465]: Removed session 65. Feb 9 10:14:08.112000 audit[11262]: CRED_ACQ pid=11262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:08.296125 kernel: audit: type=1101 audit(1707473648.111:2186): pid=11262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:08.296165 kernel: audit: type=1103 audit(1707473648.112:2187): pid=11262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:08.296200 kernel: audit: type=1006 audit(1707473648.112:2188): pid=11262 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=65 res=1 Feb 9 10:14:08.112000 audit[11262]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc23c8dd60 a2=3 a3=0 items=0 ppid=1 pid=11262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:08.447041 kernel: audit: type=1300 audit(1707473648.112:2188): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc23c8dd60 a2=3 a3=0 items=0 ppid=1 pid=11262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:08.447075 kernel: audit: type=1327 audit(1707473648.112:2188): proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:08.112000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:08.117000 audit[11262]: USER_START pid=11262 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:08.572029 kernel: audit: type=1105 audit(1707473648.117:2189): pid=11262 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:08.572131 kernel: audit: type=1103 audit(1707473648.118:2190): pid=11264 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:08.118000 audit[11264]: CRED_ACQ pid=11264 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:08.200000 audit[11262]: USER_END pid=11262 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:08.756899 kernel: audit: type=1106 audit(1707473648.200:2191): pid=11262 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:08.756962 kernel: audit: type=1104 audit(1707473648.200:2192): pid=11262 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:08.200000 audit[11262]: CRED_DISP pid=11262 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:08.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.113:22-147.75.109.163:54238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:13.209779 systemd[1]: Started sshd@69-139.178.90.113:22-147.75.109.163:54244.service. Feb 9 10:14:13.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.113:22-147.75.109.163:54244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:13.236402 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:14:13.236482 kernel: audit: type=1130 audit(1707473653.209:2194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.113:22-147.75.109.163:54244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:13.358000 audit[11307]: USER_ACCT pid=11307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:13.358906 sshd[11307]: Accepted publickey for core from 147.75.109.163 port 54244 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:14:13.360882 sshd[11307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:13.363135 systemd-logind[1465]: New session 66 of user core. Feb 9 10:14:13.363679 systemd[1]: Started session-66.scope. Feb 9 10:14:13.360000 audit[11307]: CRED_ACQ pid=11307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:13.540811 kernel: audit: type=1101 audit(1707473653.358:2195): pid=11307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:13.540870 kernel: audit: type=1103 audit(1707473653.360:2196): pid=11307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:13.540890 kernel: audit: type=1006 audit(1707473653.360:2197): pid=11307 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=66 res=1 Feb 9 10:14:13.599484 kernel: audit: type=1300 audit(1707473653.360:2197): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80126450 a2=3 a3=0 items=0 ppid=1 pid=11307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:13.360000 audit[11307]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80126450 a2=3 a3=0 items=0 ppid=1 pid=11307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:13.360000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:13.691975 sshd[11307]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:13.693522 systemd[1]: sshd@69-139.178.90.113:22-147.75.109.163:54244.service: Deactivated successfully. Feb 9 10:14:13.693968 systemd[1]: session-66.scope: Deactivated successfully. Feb 9 10:14:13.694352 systemd-logind[1465]: Session 66 logged out. Waiting for processes to exit. Feb 9 10:14:13.694768 systemd-logind[1465]: Removed session 66. Feb 9 10:14:13.722209 kernel: audit: type=1327 audit(1707473653.360:2197): proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:13.722249 kernel: audit: type=1105 audit(1707473653.365:2198): pid=11307 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:13.365000 audit[11307]: USER_START pid=11307 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:13.366000 audit[11338]: CRED_ACQ pid=11338 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:13.906045 kernel: audit: type=1103 audit(1707473653.366:2199): pid=11338 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:13.906084 kernel: audit: type=1106 audit(1707473653.692:2200): pid=11307 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:13.692000 audit[11307]: USER_END pid=11307 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:13.692000 audit[11307]: CRED_DISP pid=11307 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:14.002632 kernel: audit: type=1104 audit(1707473653.692:2201): pid=11307 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:13.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.113:22-147.75.109.163:54244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:18.643209 systemd[1]: Started sshd@70-139.178.90.113:22-147.75.109.163:37376.service. Feb 9 10:14:18.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.113:22-147.75.109.163:37376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:18.670050 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:14:18.670127 kernel: audit: type=1130 audit(1707473658.641:2203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.113:22-147.75.109.163:37376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:18.801000 audit[11361]: USER_ACCT pid=11361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:18.802115 sshd[11361]: Accepted publickey for core from 147.75.109.163 port 37376 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:14:18.803725 sshd[11361]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:18.806259 systemd-logind[1465]: New session 67 of user core. Feb 9 10:14:18.806773 systemd[1]: Started session-67.scope. Feb 9 10:14:18.886563 sshd[11361]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:18.888055 systemd[1]: sshd@70-139.178.90.113:22-147.75.109.163:37376.service: Deactivated successfully. Feb 9 10:14:18.888501 systemd[1]: session-67.scope: Deactivated successfully. Feb 9 10:14:18.888859 systemd-logind[1465]: Session 67 logged out. Waiting for processes to exit. Feb 9 10:14:18.889298 systemd-logind[1465]: Removed session 67. Feb 9 10:14:18.801000 audit[11361]: CRED_ACQ pid=11361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:18.983996 kernel: audit: type=1101 audit(1707473658.801:2204): pid=11361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:18.984034 kernel: audit: type=1103 audit(1707473658.801:2205): pid=11361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:18.984051 kernel: audit: type=1006 audit(1707473658.802:2206): pid=11361 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=67 res=1 Feb 9 10:14:19.042637 kernel: audit: type=1300 audit(1707473658.802:2206): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe063fad10 a2=3 a3=0 items=0 ppid=1 pid=11361 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:18.802000 audit[11361]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe063fad10 a2=3 a3=0 items=0 ppid=1 pid=11361 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:19.134678 kernel: audit: type=1327 audit(1707473658.802:2206): proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:18.802000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:18.807000 audit[11361]: USER_START pid=11361 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:19.259683 kernel: audit: type=1105 audit(1707473658.807:2207): pid=11361 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:19.259718 kernel: audit: type=1103 audit(1707473658.808:2208): pid=11363 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:18.808000 audit[11363]: CRED_ACQ pid=11363 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:19.348964 kernel: audit: type=1106 audit(1707473658.885:2209): pid=11361 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:18.885000 audit[11361]: USER_END pid=11361 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:19.444535 kernel: audit: type=1104 audit(1707473658.885:2210): pid=11361 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:18.885000 audit[11361]: CRED_DISP pid=11361 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:18.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.113:22-147.75.109.163:37376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:23.891339 systemd[1]: Started sshd@71-139.178.90.113:22-147.75.109.163:37378.service. Feb 9 10:14:23.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.113:22-147.75.109.163:37378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:23.918492 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:14:23.918539 kernel: audit: type=1130 audit(1707473663.890:2212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.113:22-147.75.109.163:37378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:24.040000 audit[11441]: USER_ACCT pid=11441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:24.041032 sshd[11441]: Accepted publickey for core from 147.75.109.163 port 37378 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:14:24.042390 sshd[11441]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:24.044913 systemd-logind[1465]: New session 68 of user core. Feb 9 10:14:24.045468 systemd[1]: Started session-68.scope. Feb 9 10:14:24.124392 sshd[11441]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:24.125786 systemd[1]: sshd@71-139.178.90.113:22-147.75.109.163:37378.service: Deactivated successfully. Feb 9 10:14:24.126220 systemd[1]: session-68.scope: Deactivated successfully. Feb 9 10:14:24.126517 systemd-logind[1465]: Session 68 logged out. Waiting for processes to exit. Feb 9 10:14:24.127145 systemd-logind[1465]: Removed session 68. Feb 9 10:14:24.041000 audit[11441]: CRED_ACQ pid=11441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:24.223388 kernel: audit: type=1101 audit(1707473664.040:2213): pid=11441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:24.223424 kernel: audit: type=1103 audit(1707473664.041:2214): pid=11441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:24.223442 kernel: audit: type=1006 audit(1707473664.041:2215): pid=11441 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=68 res=1 Feb 9 10:14:24.282004 kernel: audit: type=1300 audit(1707473664.041:2215): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1b4c46d0 a2=3 a3=0 items=0 ppid=1 pid=11441 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:24.041000 audit[11441]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1b4c46d0 a2=3 a3=0 items=0 ppid=1 pid=11441 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:24.374039 kernel: audit: type=1327 audit(1707473664.041:2215): proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:24.041000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:24.404537 kernel: audit: type=1105 audit(1707473664.047:2216): pid=11441 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:24.047000 audit[11441]: USER_START pid=11441 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:24.499075 kernel: audit: type=1103 audit(1707473664.047:2217): pid=11443 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:24.047000 audit[11443]: CRED_ACQ pid=11443 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:24.588374 kernel: audit: type=1106 audit(1707473664.124:2218): pid=11441 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:24.124000 audit[11441]: USER_END pid=11441 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:24.683906 kernel: audit: type=1104 audit(1707473664.124:2219): pid=11441 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:24.124000 audit[11441]: CRED_DISP pid=11441 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:24.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.113:22-147.75.109.163:37378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:29.134353 systemd[1]: Started sshd@72-139.178.90.113:22-147.75.109.163:57568.service. Feb 9 10:14:29.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.113:22-147.75.109.163:57568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:29.161241 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:14:29.161327 kernel: audit: type=1130 audit(1707473669.132:2221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.113:22-147.75.109.163:57568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:29.283000 audit[11469]: USER_ACCT pid=11469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:29.284044 sshd[11469]: Accepted publickey for core from 147.75.109.163 port 57568 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:14:29.284840 sshd[11469]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:29.287395 systemd-logind[1465]: New session 69 of user core. Feb 9 10:14:29.287972 systemd[1]: Started session-69.scope. Feb 9 10:14:29.367520 sshd[11469]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:29.369054 systemd[1]: sshd@72-139.178.90.113:22-147.75.109.163:57568.service: Deactivated successfully. Feb 9 10:14:29.369492 systemd[1]: session-69.scope: Deactivated successfully. Feb 9 10:14:29.370054 systemd-logind[1465]: Session 69 logged out. Waiting for processes to exit. Feb 9 10:14:29.370699 systemd-logind[1465]: Removed session 69. Feb 9 10:14:29.283000 audit[11469]: CRED_ACQ pid=11469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:29.375569 kernel: audit: type=1101 audit(1707473669.283:2222): pid=11469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:29.375645 kernel: audit: type=1103 audit(1707473669.283:2223): pid=11469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:29.524586 kernel: audit: type=1006 audit(1707473669.283:2224): pid=11469 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=69 res=1 Feb 9 10:14:29.524653 kernel: audit: type=1300 audit(1707473669.283:2224): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdef54d8c0 a2=3 a3=0 items=0 ppid=1 pid=11469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:29.283000 audit[11469]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdef54d8c0 a2=3 a3=0 items=0 ppid=1 pid=11469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:29.283000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:29.647051 kernel: audit: type=1327 audit(1707473669.283:2224): proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:29.647089 kernel: audit: type=1105 audit(1707473669.288:2225): pid=11469 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:29.288000 audit[11469]: USER_START pid=11469 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:29.289000 audit[11471]: CRED_ACQ pid=11471 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:29.742631 kernel: audit: type=1103 audit(1707473669.289:2226): pid=11471 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:29.366000 audit[11469]: USER_END pid=11469 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:29.926414 kernel: audit: type=1106 audit(1707473669.366:2227): pid=11469 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:29.926452 kernel: audit: type=1104 audit(1707473669.366:2228): pid=11469 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:29.366000 audit[11469]: CRED_DISP pid=11469 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:29.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.113:22-147.75.109.163:57568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:34.377762 systemd[1]: Started sshd@73-139.178.90.113:22-147.75.109.163:57572.service. Feb 9 10:14:34.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.113:22-147.75.109.163:57572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:34.404802 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:14:34.404891 kernel: audit: type=1130 audit(1707473674.377:2230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.113:22-147.75.109.163:57572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:34.526000 audit[11495]: USER_ACCT pid=11495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:34.526863 sshd[11495]: Accepted publickey for core from 147.75.109.163 port 57572 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:14:34.528259 sshd[11495]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:34.530901 systemd-logind[1465]: New session 70 of user core. Feb 9 10:14:34.531325 systemd[1]: Started session-70.scope. Feb 9 10:14:34.618000 sshd[11495]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:34.527000 audit[11495]: CRED_ACQ pid=11495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:34.619578 systemd[1]: sshd@73-139.178.90.113:22-147.75.109.163:57572.service: Deactivated successfully. Feb 9 10:14:34.620024 systemd[1]: session-70.scope: Deactivated successfully. Feb 9 10:14:34.620439 systemd-logind[1465]: Session 70 logged out. Waiting for processes to exit. Feb 9 10:14:34.621014 systemd-logind[1465]: Removed session 70. Feb 9 10:14:34.708729 kernel: audit: type=1101 audit(1707473674.526:2231): pid=11495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:34.708779 kernel: audit: type=1103 audit(1707473674.527:2232): pid=11495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:34.708805 kernel: audit: type=1006 audit(1707473674.527:2233): pid=11495 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=70 res=1 Feb 9 10:14:34.767343 kernel: audit: type=1300 audit(1707473674.527:2233): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc74d37310 a2=3 a3=0 items=0 ppid=1 pid=11495 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:34.527000 audit[11495]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc74d37310 a2=3 a3=0 items=0 ppid=1 pid=11495 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:34.859283 kernel: audit: type=1327 audit(1707473674.527:2233): proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:34.527000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:34.889751 kernel: audit: type=1105 audit(1707473674.533:2234): pid=11495 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:34.533000 audit[11495]: USER_START pid=11495 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:34.984205 kernel: audit: type=1103 audit(1707473674.534:2235): pid=11497 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:34.534000 audit[11497]: CRED_ACQ pid=11497 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:35.073413 kernel: audit: type=1106 audit(1707473674.618:2236): pid=11495 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:34.618000 audit[11495]: USER_END pid=11495 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:35.168865 kernel: audit: type=1104 audit(1707473674.618:2237): pid=11495 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:34.618000 audit[11495]: CRED_DISP pid=11495 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:34.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.113:22-147.75.109.163:57572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:38.762000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:14:38.762000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ba12a0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:14:38.762000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:14:38.762000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:14:38.762000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000899620 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:14:38.762000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:14:38.815000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:14:38.815000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00ac86e40 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:14:38.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:14:38.815000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:14:38.815000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:14:38.815000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c013657d10 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:14:38.815000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c005d9bc50 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:14:38.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:14:38.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:14:38.816000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:14:38.816000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c011186540 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:14:38.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:14:38.817000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:14:38.817000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00323a9a0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:14:38.817000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:14:38.831000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:14:38.831000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c012872a20 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:14:38.831000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:14:39.627785 systemd[1]: Started sshd@74-139.178.90.113:22-147.75.109.163:38048.service. Feb 9 10:14:39.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.113:22-147.75.109.163:38048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:39.654816 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:14:39.654894 kernel: audit: type=1130 audit(1707473679.626:2247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.113:22-147.75.109.163:38048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:39.777401 sshd[11539]: Accepted publickey for core from 147.75.109.163 port 38048 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:14:39.775000 audit[11539]: USER_ACCT pid=11539 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:39.778862 sshd[11539]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:39.781170 systemd-logind[1465]: New session 71 of user core. Feb 9 10:14:39.781737 systemd[1]: Started session-71.scope. Feb 9 10:14:39.864449 sshd[11539]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:39.866005 systemd[1]: sshd@74-139.178.90.113:22-147.75.109.163:38048.service: Deactivated successfully. Feb 9 10:14:39.866514 systemd[1]: session-71.scope: Deactivated successfully. Feb 9 10:14:39.866960 systemd-logind[1465]: Session 71 logged out. Waiting for processes to exit. Feb 9 10:14:39.867412 systemd-logind[1465]: Removed session 71. Feb 9 10:14:39.777000 audit[11539]: CRED_ACQ pid=11539 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:39.961498 kernel: audit: type=1101 audit(1707473679.775:2248): pid=11539 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:39.961571 kernel: audit: type=1103 audit(1707473679.777:2249): pid=11539 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:39.961611 kernel: audit: type=1006 audit(1707473679.777:2250): pid=11539 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=71 res=1 Feb 9 10:14:39.777000 audit[11539]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe01a183f0 a2=3 a3=0 items=0 ppid=1 pid=11539 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:40.112112 kernel: audit: type=1300 audit(1707473679.777:2250): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe01a183f0 a2=3 a3=0 items=0 ppid=1 pid=11539 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:40.112161 kernel: audit: type=1327 audit(1707473679.777:2250): proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:39.777000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:39.782000 audit[11539]: USER_START pid=11539 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:40.237025 kernel: audit: type=1105 audit(1707473679.782:2251): pid=11539 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:40.237075 kernel: audit: type=1103 audit(1707473679.783:2252): pid=11541 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:39.783000 audit[11541]: CRED_ACQ pid=11541 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:39.863000 audit[11539]: USER_END pid=11539 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:40.421792 kernel: audit: type=1106 audit(1707473679.863:2253): pid=11539 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:40.421850 kernel: audit: type=1104 audit(1707473679.863:2254): pid=11539 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:39.863000 audit[11539]: CRED_DISP pid=11539 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:39.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.113:22-147.75.109.163:38048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:42.809000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:14:42.809000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024d63a0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:14:42.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:14:42.809000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:14:42.809000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001d4bae0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:14:42.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:14:42.809000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:14:42.809000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:14:42.809000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001d4bb00 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:14:42.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:14:42.809000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ba12c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:14:42.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:14:44.873359 systemd[1]: Started sshd@75-139.178.90.113:22-147.75.109.163:47294.service. Feb 9 10:14:44.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.113:22-147.75.109.163:47294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:44.900563 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:14:44.900609 kernel: audit: type=1130 audit(1707473684.872:2260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.113:22-147.75.109.163:47294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:45.059000 audit[11613]: USER_ACCT pid=11613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:45.061162 sshd[11613]: Accepted publickey for core from 147.75.109.163 port 47294 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:14:45.064874 sshd[11613]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:45.074645 systemd-logind[1465]: New session 72 of user core. Feb 9 10:14:45.077301 systemd[1]: Started session-72.scope. Feb 9 10:14:45.063000 audit[11613]: CRED_ACQ pid=11613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:45.170707 sshd[11613]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:45.172156 systemd[1]: sshd@75-139.178.90.113:22-147.75.109.163:47294.service: Deactivated successfully. Feb 9 10:14:45.172614 systemd[1]: session-72.scope: Deactivated successfully. Feb 9 10:14:45.172987 systemd-logind[1465]: Session 72 logged out. Waiting for processes to exit. Feb 9 10:14:45.173437 systemd-logind[1465]: Removed session 72. Feb 9 10:14:45.244319 kernel: audit: type=1101 audit(1707473685.059:2261): pid=11613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:45.244361 kernel: audit: type=1103 audit(1707473685.063:2262): pid=11613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:45.244381 kernel: audit: type=1006 audit(1707473685.063:2263): pid=11613 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=72 res=1 Feb 9 10:14:45.302971 kernel: audit: type=1300 audit(1707473685.063:2263): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd48c60f00 a2=3 a3=0 items=0 ppid=1 pid=11613 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:45.063000 audit[11613]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd48c60f00 a2=3 a3=0 items=0 ppid=1 pid=11613 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:45.394962 kernel: audit: type=1327 audit(1707473685.063:2263): proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:45.063000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:45.425420 kernel: audit: type=1105 audit(1707473685.088:2264): pid=11613 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:45.088000 audit[11613]: USER_START pid=11613 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:45.519899 kernel: audit: type=1103 audit(1707473685.090:2265): pid=11615 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:45.090000 audit[11615]: CRED_ACQ pid=11615 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:45.609072 kernel: audit: type=1106 audit(1707473685.170:2266): pid=11613 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:45.170000 audit[11613]: USER_END pid=11613 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:45.704548 kernel: audit: type=1104 audit(1707473685.170:2267): pid=11613 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:45.170000 audit[11613]: CRED_DISP pid=11613 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:45.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.113:22-147.75.109.163:47294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:48.069000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:14:48.069000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001961a80 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:14:48.069000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:14:48.137000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:14:48.137000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a7e800 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:14:48.137000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:14:50.180335 systemd[1]: Started sshd@76-139.178.90.113:22-147.75.109.163:47300.service. Feb 9 10:14:50.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.113:22-147.75.109.163:47300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:50.207233 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:14:50.207327 kernel: audit: type=1130 audit(1707473690.179:2271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.113:22-147.75.109.163:47300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:50.327000 audit[11639]: USER_ACCT pid=11639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:50.329527 sshd[11639]: Accepted publickey for core from 147.75.109.163 port 47300 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:14:50.331847 sshd[11639]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:50.334187 systemd-logind[1465]: New session 73 of user core. Feb 9 10:14:50.334890 systemd[1]: Started session-73.scope. Feb 9 10:14:50.413774 sshd[11639]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:50.415285 systemd[1]: sshd@76-139.178.90.113:22-147.75.109.163:47300.service: Deactivated successfully. Feb 9 10:14:50.415782 systemd[1]: session-73.scope: Deactivated successfully. Feb 9 10:14:50.416157 systemd-logind[1465]: Session 73 logged out. Waiting for processes to exit. Feb 9 10:14:50.416563 systemd-logind[1465]: Removed session 73. Feb 9 10:14:50.330000 audit[11639]: CRED_ACQ pid=11639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:50.511790 kernel: audit: type=1101 audit(1707473690.327:2272): pid=11639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:50.511829 kernel: audit: type=1103 audit(1707473690.330:2273): pid=11639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:50.511848 kernel: audit: type=1006 audit(1707473690.330:2274): pid=11639 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=73 res=1 Feb 9 10:14:50.570439 kernel: audit: type=1300 audit(1707473690.330:2274): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe42d58790 a2=3 a3=0 items=0 ppid=1 pid=11639 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:50.330000 audit[11639]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe42d58790 a2=3 a3=0 items=0 ppid=1 pid=11639 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:50.662438 kernel: audit: type=1327 audit(1707473690.330:2274): proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:50.330000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:50.692944 kernel: audit: type=1105 audit(1707473690.335:2275): pid=11639 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:50.335000 audit[11639]: USER_START pid=11639 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:50.787421 kernel: audit: type=1103 audit(1707473690.336:2276): pid=11641 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:50.336000 audit[11641]: CRED_ACQ pid=11641 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:50.413000 audit[11639]: USER_END pid=11639 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:50.972259 kernel: audit: type=1106 audit(1707473690.413:2277): pid=11639 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:50.972300 kernel: audit: type=1104 audit(1707473690.413:2278): pid=11639 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:50.413000 audit[11639]: CRED_DISP pid=11639 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:50.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.113:22-147.75.109.163:47300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:55.417163 systemd[1]: Started sshd@77-139.178.90.113:22-147.75.109.163:32776.service. Feb 9 10:14:55.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.113:22-147.75.109.163:32776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:55.444197 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:14:55.444273 kernel: audit: type=1130 audit(1707473695.415:2280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.113:22-147.75.109.163:32776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:55.591000 audit[11704]: USER_ACCT pid=11704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:55.593443 sshd[11704]: Accepted publickey for core from 147.75.109.163 port 32776 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:14:55.597060 sshd[11704]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:55.606796 systemd-logind[1465]: New session 74 of user core. Feb 9 10:14:55.609877 systemd[1]: Started session-74.scope. Feb 9 10:14:55.594000 audit[11704]: CRED_ACQ pid=11704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:55.705061 sshd[11704]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:55.706404 systemd[1]: sshd@77-139.178.90.113:22-147.75.109.163:32776.service: Deactivated successfully. Feb 9 10:14:55.706854 systemd[1]: session-74.scope: Deactivated successfully. Feb 9 10:14:55.707248 systemd-logind[1465]: Session 74 logged out. Waiting for processes to exit. Feb 9 10:14:55.707680 systemd-logind[1465]: Removed session 74. Feb 9 10:14:55.775769 kernel: audit: type=1101 audit(1707473695.591:2281): pid=11704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:55.775811 kernel: audit: type=1103 audit(1707473695.594:2282): pid=11704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:55.775828 kernel: audit: type=1006 audit(1707473695.594:2283): pid=11704 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=74 res=1 Feb 9 10:14:55.594000 audit[11704]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff74040560 a2=3 a3=0 items=0 ppid=1 pid=11704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:55.834560 kernel: audit: type=1300 audit(1707473695.594:2283): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff74040560 a2=3 a3=0 items=0 ppid=1 pid=11704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:55.594000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:55.956992 kernel: audit: type=1327 audit(1707473695.594:2283): proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:55.957023 kernel: audit: type=1105 audit(1707473695.619:2284): pid=11704 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:55.619000 audit[11704]: USER_START pid=11704 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:56.051528 kernel: audit: type=1103 audit(1707473695.621:2285): pid=11706 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:55.621000 audit[11706]: CRED_ACQ pid=11706 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:56.140833 kernel: audit: type=1106 audit(1707473695.704:2286): pid=11704 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:55.704000 audit[11704]: USER_END pid=11704 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:56.236382 kernel: audit: type=1104 audit(1707473695.704:2287): pid=11704 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:55.704000 audit[11704]: CRED_DISP pid=11704 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:14:55.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.113:22-147.75.109.163:32776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:00.713890 systemd[1]: Started sshd@78-139.178.90.113:22-147.75.109.163:32788.service. Feb 9 10:15:00.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.113:22-147.75.109.163:32788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:00.740720 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:15:00.740786 kernel: audit: type=1130 audit(1707473700.713:2289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.113:22-147.75.109.163:32788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:00.861599 sshd[11731]: Accepted publickey for core from 147.75.109.163 port 32788 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:00.861000 audit[11731]: USER_ACCT pid=11731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:00.862849 sshd[11731]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:00.865482 systemd-logind[1465]: New session 75 of user core. Feb 9 10:15:00.866014 systemd[1]: Started session-75.scope. Feb 9 10:15:00.944890 sshd[11731]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:00.946289 systemd[1]: sshd@78-139.178.90.113:22-147.75.109.163:32788.service: Deactivated successfully. Feb 9 10:15:00.946739 systemd[1]: session-75.scope: Deactivated successfully. Feb 9 10:15:00.947174 systemd-logind[1465]: Session 75 logged out. Waiting for processes to exit. Feb 9 10:15:00.947630 systemd-logind[1465]: Removed session 75. Feb 9 10:15:00.862000 audit[11731]: CRED_ACQ pid=11731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:01.043737 kernel: audit: type=1101 audit(1707473700.861:2290): pid=11731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:01.043784 kernel: audit: type=1103 audit(1707473700.862:2291): pid=11731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:01.043803 kernel: audit: type=1006 audit(1707473700.862:2292): pid=11731 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=75 res=1 Feb 9 10:15:01.102388 kernel: audit: type=1300 audit(1707473700.862:2292): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd2f73860 a2=3 a3=0 items=0 ppid=1 pid=11731 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.862000 audit[11731]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd2f73860 a2=3 a3=0 items=0 ppid=1 pid=11731 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:01.194440 kernel: audit: type=1327 audit(1707473700.862:2292): proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:00.862000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:01.224921 kernel: audit: type=1105 audit(1707473700.867:2293): pid=11731 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:00.867000 audit[11731]: USER_START pid=11731 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:01.319532 kernel: audit: type=1103 audit(1707473700.868:2294): pid=11733 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:00.868000 audit[11733]: CRED_ACQ pid=11733 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:01.408783 kernel: audit: type=1106 audit(1707473700.945:2295): pid=11731 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:00.945000 audit[11731]: USER_END pid=11731 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:01.504292 kernel: audit: type=1104 audit(1707473700.945:2296): pid=11731 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:00.945000 audit[11731]: CRED_DISP pid=11731 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:00.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.113:22-147.75.109.163:32788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:05.954865 systemd[1]: Started sshd@79-139.178.90.113:22-147.75.109.163:52390.service. Feb 9 10:15:05.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.113:22-147.75.109.163:52390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:05.981985 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:15:05.982078 kernel: audit: type=1130 audit(1707473705.953:2298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.113:22-147.75.109.163:52390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:06.103000 audit[11757]: USER_ACCT pid=11757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:06.104898 sshd[11757]: Accepted publickey for core from 147.75.109.163 port 52390 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:06.106467 sshd[11757]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:06.108974 systemd-logind[1465]: New session 76 of user core. Feb 9 10:15:06.109452 systemd[1]: Started session-76.scope. Feb 9 10:15:06.188495 sshd[11757]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:06.189877 systemd[1]: sshd@79-139.178.90.113:22-147.75.109.163:52390.service: Deactivated successfully. Feb 9 10:15:06.190323 systemd[1]: session-76.scope: Deactivated successfully. Feb 9 10:15:06.190756 systemd-logind[1465]: Session 76 logged out. Waiting for processes to exit. Feb 9 10:15:06.191373 systemd-logind[1465]: Removed session 76. Feb 9 10:15:06.104000 audit[11757]: CRED_ACQ pid=11757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:06.287123 kernel: audit: type=1101 audit(1707473706.103:2299): pid=11757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:06.287165 kernel: audit: type=1103 audit(1707473706.104:2300): pid=11757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:06.287184 kernel: audit: type=1006 audit(1707473706.104:2301): pid=11757 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=76 res=1 Feb 9 10:15:06.104000 audit[11757]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc529e4ef0 a2=3 a3=0 items=0 ppid=1 pid=11757 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:06.437725 kernel: audit: type=1300 audit(1707473706.104:2301): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc529e4ef0 a2=3 a3=0 items=0 ppid=1 pid=11757 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:06.437760 kernel: audit: type=1327 audit(1707473706.104:2301): proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:06.104000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:06.468180 kernel: audit: type=1105 audit(1707473706.110:2302): pid=11757 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:06.110000 audit[11757]: USER_START pid=11757 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:06.562631 kernel: audit: type=1103 audit(1707473706.110:2303): pid=11759 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:06.110000 audit[11759]: CRED_ACQ pid=11759 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:06.651828 kernel: audit: type=1106 audit(1707473706.187:2304): pid=11757 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:06.187000 audit[11757]: USER_END pid=11757 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:06.747288 kernel: audit: type=1104 audit(1707473706.187:2305): pid=11757 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:06.187000 audit[11757]: CRED_DISP pid=11757 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:06.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.113:22-147.75.109.163:52390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:11.194645 systemd[1]: Started sshd@80-139.178.90.113:22-147.75.109.163:52402.service. Feb 9 10:15:11.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.113:22-147.75.109.163:52402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:11.221778 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:15:11.221877 kernel: audit: type=1130 audit(1707473711.194:2307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.113:22-147.75.109.163:52402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:11.342000 audit[11781]: USER_ACCT pid=11781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:11.342990 sshd[11781]: Accepted publickey for core from 147.75.109.163 port 52402 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:11.344088 sshd[11781]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:11.346593 systemd-logind[1465]: New session 77 of user core. Feb 9 10:15:11.347115 systemd[1]: Started session-77.scope. Feb 9 10:15:11.427126 sshd[11781]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:11.428566 systemd[1]: sshd@80-139.178.90.113:22-147.75.109.163:52402.service: Deactivated successfully. Feb 9 10:15:11.429106 systemd[1]: session-77.scope: Deactivated successfully. Feb 9 10:15:11.429443 systemd-logind[1465]: Session 77 logged out. Waiting for processes to exit. Feb 9 10:15:11.430029 systemd-logind[1465]: Removed session 77. Feb 9 10:15:11.343000 audit[11781]: CRED_ACQ pid=11781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:11.436623 kernel: audit: type=1101 audit(1707473711.342:2308): pid=11781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:11.436668 kernel: audit: type=1103 audit(1707473711.343:2309): pid=11781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:11.585895 kernel: audit: type=1006 audit(1707473711.343:2310): pid=11781 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=77 res=1 Feb 9 10:15:11.585935 kernel: audit: type=1300 audit(1707473711.343:2310): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff24e76080 a2=3 a3=0 items=0 ppid=1 pid=11781 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:11.343000 audit[11781]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff24e76080 a2=3 a3=0 items=0 ppid=1 pid=11781 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:11.677874 kernel: audit: type=1327 audit(1707473711.343:2310): proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:11.343000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:11.708362 kernel: audit: type=1105 audit(1707473711.348:2311): pid=11781 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:11.348000 audit[11781]: USER_START pid=11781 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:11.802889 kernel: audit: type=1103 audit(1707473711.349:2312): pid=11783 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:11.349000 audit[11783]: CRED_ACQ pid=11783 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:11.427000 audit[11781]: USER_END pid=11781 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:11.987640 kernel: audit: type=1106 audit(1707473711.427:2313): pid=11781 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:11.987690 kernel: audit: type=1104 audit(1707473711.427:2314): pid=11781 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:11.427000 audit[11781]: CRED_DISP pid=11781 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:11.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.113:22-147.75.109.163:52402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:16.437283 systemd[1]: Started sshd@81-139.178.90.113:22-147.75.109.163:45296.service. Feb 9 10:15:16.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.113:22-147.75.109.163:45296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:16.464709 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:15:16.464784 kernel: audit: type=1130 audit(1707473716.436:2316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.113:22-147.75.109.163:45296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:16.587000 audit[11851]: USER_ACCT pid=11851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:16.588175 sshd[11851]: Accepted publickey for core from 147.75.109.163 port 45296 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:16.588889 sshd[11851]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:16.591545 systemd-logind[1465]: New session 78 of user core. Feb 9 10:15:16.592069 systemd[1]: Started session-78.scope. Feb 9 10:15:16.671733 sshd[11851]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:16.673206 systemd[1]: sshd@81-139.178.90.113:22-147.75.109.163:45296.service: Deactivated successfully. Feb 9 10:15:16.673658 systemd[1]: session-78.scope: Deactivated successfully. Feb 9 10:15:16.674036 systemd-logind[1465]: Session 78 logged out. Waiting for processes to exit. Feb 9 10:15:16.674489 systemd-logind[1465]: Removed session 78. Feb 9 10:15:16.588000 audit[11851]: CRED_ACQ pid=11851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:16.771708 kernel: audit: type=1101 audit(1707473716.587:2317): pid=11851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:16.771754 kernel: audit: type=1103 audit(1707473716.588:2318): pid=11851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:16.771775 kernel: audit: type=1006 audit(1707473716.588:2319): pid=11851 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=78 res=1 Feb 9 10:15:16.588000 audit[11851]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb337ab80 a2=3 a3=0 items=0 ppid=1 pid=11851 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:16.922331 kernel: audit: type=1300 audit(1707473716.588:2319): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb337ab80 a2=3 a3=0 items=0 ppid=1 pid=11851 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:16.922367 kernel: audit: type=1327 audit(1707473716.588:2319): proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:16.588000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:16.952778 kernel: audit: type=1105 audit(1707473716.593:2320): pid=11851 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:16.593000 audit[11851]: USER_START pid=11851 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:17.047267 kernel: audit: type=1103 audit(1707473716.594:2321): pid=11853 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:16.594000 audit[11853]: CRED_ACQ pid=11853 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:17.136542 kernel: audit: type=1106 audit(1707473716.671:2322): pid=11851 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:16.671000 audit[11851]: USER_END pid=11851 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:16.671000 audit[11851]: CRED_DISP pid=11851 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:17.232646 kernel: audit: type=1104 audit(1707473716.671:2323): pid=11851 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:16.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.113:22-147.75.109.163:45296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:21.681715 systemd[1]: Started sshd@82-139.178.90.113:22-147.75.109.163:45304.service. Feb 9 10:15:21.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.113:22-147.75.109.163:45304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:21.708791 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:15:21.708887 kernel: audit: type=1130 audit(1707473721.680:2325): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.113:22-147.75.109.163:45304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:21.829000 audit[11876]: USER_ACCT pid=11876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:21.830976 sshd[11876]: Accepted publickey for core from 147.75.109.163 port 45304 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:21.832827 sshd[11876]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:21.835051 systemd-logind[1465]: New session 79 of user core. Feb 9 10:15:21.835596 systemd[1]: Started session-79.scope. Feb 9 10:15:21.913167 sshd[11876]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:21.914590 systemd[1]: sshd@82-139.178.90.113:22-147.75.109.163:45304.service: Deactivated successfully. Feb 9 10:15:21.915020 systemd[1]: session-79.scope: Deactivated successfully. Feb 9 10:15:21.915349 systemd-logind[1465]: Session 79 logged out. Waiting for processes to exit. Feb 9 10:15:21.915946 systemd-logind[1465]: Removed session 79. Feb 9 10:15:21.831000 audit[11876]: CRED_ACQ pid=11876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:22.012919 kernel: audit: type=1101 audit(1707473721.829:2326): pid=11876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:22.012958 kernel: audit: type=1103 audit(1707473721.831:2327): pid=11876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:22.012980 kernel: audit: type=1006 audit(1707473721.831:2328): pid=11876 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=79 res=1 Feb 9 10:15:22.071532 kernel: audit: type=1300 audit(1707473721.831:2328): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc26d9d80 a2=3 a3=0 items=0 ppid=1 pid=11876 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:21.831000 audit[11876]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc26d9d80 a2=3 a3=0 items=0 ppid=1 pid=11876 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:22.163570 kernel: audit: type=1327 audit(1707473721.831:2328): proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:21.831000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:22.194035 kernel: audit: type=1105 audit(1707473721.836:2329): pid=11876 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:21.836000 audit[11876]: USER_START pid=11876 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:22.288568 kernel: audit: type=1103 audit(1707473721.836:2330): pid=11878 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:21.836000 audit[11878]: CRED_ACQ pid=11878 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:22.377798 kernel: audit: type=1106 audit(1707473721.912:2331): pid=11876 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:21.912000 audit[11876]: USER_END pid=11876 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:21.912000 audit[11876]: CRED_DISP pid=11876 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:22.562559 kernel: audit: type=1104 audit(1707473721.912:2332): pid=11876 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:21.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.113:22-147.75.109.163:45304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:26.923220 systemd[1]: Started sshd@83-139.178.90.113:22-147.75.109.163:52132.service. Feb 9 10:15:26.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.113:22-147.75.109.163:52132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:26.949986 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:15:26.950040 kernel: audit: type=1130 audit(1707473726.921:2334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.113:22-147.75.109.163:52132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:27.070000 audit[11938]: USER_ACCT pid=11938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:27.070967 sshd[11938]: Accepted publickey for core from 147.75.109.163 port 52132 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:27.072846 sshd[11938]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:27.075301 systemd-logind[1465]: New session 80 of user core. Feb 9 10:15:27.075846 systemd[1]: Started session-80.scope. Feb 9 10:15:27.158455 sshd[11938]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:27.160173 systemd[1]: sshd@83-139.178.90.113:22-147.75.109.163:52132.service: Deactivated successfully. Feb 9 10:15:27.160740 systemd[1]: session-80.scope: Deactivated successfully. Feb 9 10:15:27.161255 systemd-logind[1465]: Session 80 logged out. Waiting for processes to exit. Feb 9 10:15:27.161843 systemd-logind[1465]: Removed session 80. Feb 9 10:15:27.071000 audit[11938]: CRED_ACQ pid=11938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:27.255881 kernel: audit: type=1101 audit(1707473727.070:2335): pid=11938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:27.255937 kernel: audit: type=1103 audit(1707473727.071:2336): pid=11938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:27.255957 kernel: audit: type=1006 audit(1707473727.071:2337): pid=11938 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=80 res=1 Feb 9 10:15:27.314792 kernel: audit: type=1300 audit(1707473727.071:2337): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda17df920 a2=3 a3=0 items=0 ppid=1 pid=11938 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:27.071000 audit[11938]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda17df920 a2=3 a3=0 items=0 ppid=1 pid=11938 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:27.406837 kernel: audit: type=1327 audit(1707473727.071:2337): proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:27.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:27.437285 kernel: audit: type=1105 audit(1707473727.076:2338): pid=11938 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:27.076000 audit[11938]: USER_START pid=11938 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:27.531786 kernel: audit: type=1103 audit(1707473727.077:2339): pid=11940 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:27.077000 audit[11940]: CRED_ACQ pid=11940 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:27.621037 kernel: audit: type=1106 audit(1707473727.157:2340): pid=11938 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:27.157000 audit[11938]: USER_END pid=11938 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:27.157000 audit[11938]: CRED_DISP pid=11938 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:27.805923 kernel: audit: type=1104 audit(1707473727.157:2341): pid=11938 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:27.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.113:22-147.75.109.163:52132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:32.168164 systemd[1]: Started sshd@84-139.178.90.113:22-147.75.109.163:52136.service. Feb 9 10:15:32.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.113:22-147.75.109.163:52136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:32.194850 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:15:32.194888 kernel: audit: type=1130 audit(1707473732.167:2343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.113:22-147.75.109.163:52136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:32.316935 sshd[11966]: Accepted publickey for core from 147.75.109.163 port 52136 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:32.316000 audit[11966]: USER_ACCT pid=11966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:32.317932 sshd[11966]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:32.320416 systemd-logind[1465]: New session 81 of user core. Feb 9 10:15:32.321047 systemd[1]: Started session-81.scope. Feb 9 10:15:32.402983 sshd[11966]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:32.404346 systemd[1]: sshd@84-139.178.90.113:22-147.75.109.163:52136.service: Deactivated successfully. Feb 9 10:15:32.404799 systemd[1]: session-81.scope: Deactivated successfully. Feb 9 10:15:32.405201 systemd-logind[1465]: Session 81 logged out. Waiting for processes to exit. Feb 9 10:15:32.405625 systemd-logind[1465]: Removed session 81. Feb 9 10:15:32.317000 audit[11966]: CRED_ACQ pid=11966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:32.499635 kernel: audit: type=1101 audit(1707473732.316:2344): pid=11966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:32.499672 kernel: audit: type=1103 audit(1707473732.317:2345): pid=11966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:32.499690 kernel: audit: type=1006 audit(1707473732.317:2346): pid=11966 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=81 res=1 Feb 9 10:15:32.317000 audit[11966]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff20998f50 a2=3 a3=0 items=0 ppid=1 pid=11966 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:32.650179 kernel: audit: type=1300 audit(1707473732.317:2346): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff20998f50 a2=3 a3=0 items=0 ppid=1 pid=11966 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:32.650207 kernel: audit: type=1327 audit(1707473732.317:2346): proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:32.317000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:32.322000 audit[11966]: USER_START pid=11966 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:32.775237 kernel: audit: type=1105 audit(1707473732.322:2347): pid=11966 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:32.775324 kernel: audit: type=1103 audit(1707473732.323:2348): pid=11968 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:32.323000 audit[11968]: CRED_ACQ pid=11968 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:32.403000 audit[11966]: USER_END pid=11966 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:32.960093 kernel: audit: type=1106 audit(1707473732.403:2349): pid=11966 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:32.960141 kernel: audit: type=1104 audit(1707473732.403:2350): pid=11966 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:32.403000 audit[11966]: CRED_DISP pid=11966 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:32.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.113:22-147.75.109.163:52136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:37.412385 systemd[1]: Started sshd@85-139.178.90.113:22-147.75.109.163:57436.service. Feb 9 10:15:37.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.113:22-147.75.109.163:57436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:37.439349 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:15:37.439428 kernel: audit: type=1130 audit(1707473737.411:2352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.113:22-147.75.109.163:57436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:37.560000 audit[11992]: USER_ACCT pid=11992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:37.561278 sshd[11992]: Accepted publickey for core from 147.75.109.163 port 57436 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:37.564682 sshd[11992]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:37.574770 systemd-logind[1465]: New session 82 of user core. Feb 9 10:15:37.577404 systemd[1]: Started session-82.scope. Feb 9 10:15:37.563000 audit[11992]: CRED_ACQ pid=11992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:37.668591 sshd[11992]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:37.670390 systemd[1]: sshd@85-139.178.90.113:22-147.75.109.163:57436.service: Deactivated successfully. Feb 9 10:15:37.670746 systemd[1]: session-82.scope: Deactivated successfully. Feb 9 10:15:37.671088 systemd-logind[1465]: Session 82 logged out. Waiting for processes to exit. Feb 9 10:15:37.671666 systemd[1]: Started sshd@86-139.178.90.113:22-147.75.109.163:57442.service. Feb 9 10:15:37.672150 systemd-logind[1465]: Removed session 82. Feb 9 10:15:37.743639 kernel: audit: type=1101 audit(1707473737.560:2353): pid=11992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:37.743686 kernel: audit: type=1103 audit(1707473737.563:2354): pid=11992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:37.743706 kernel: audit: type=1006 audit(1707473737.563:2355): pid=11992 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=82 res=1 Feb 9 10:15:37.802363 kernel: audit: type=1300 audit(1707473737.563:2355): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8d471970 a2=3 a3=0 items=0 ppid=1 pid=11992 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:37.563000 audit[11992]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8d471970 a2=3 a3=0 items=0 ppid=1 pid=11992 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:37.834551 sshd[12017]: Accepted publickey for core from 147.75.109.163 port 57442 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:37.835797 sshd[12017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:37.838331 systemd-logind[1465]: New session 83 of user core. Feb 9 10:15:37.838961 systemd[1]: Started session-83.scope. Feb 9 10:15:37.563000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:37.924951 kernel: audit: type=1327 audit(1707473737.563:2355): proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:37.925020 kernel: audit: type=1105 audit(1707473737.588:2356): pid=11992 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:37.588000 audit[11992]: USER_START pid=11992 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:38.019587 kernel: audit: type=1103 audit(1707473737.590:2357): pid=11994 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:37.590000 audit[11994]: CRED_ACQ pid=11994 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:38.108909 kernel: audit: type=1106 audit(1707473737.668:2358): pid=11992 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:37.668000 audit[11992]: USER_END pid=11992 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:38.204441 kernel: audit: type=1104 audit(1707473737.668:2359): pid=11992 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:37.668000 audit[11992]: CRED_DISP pid=11992 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:37.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.113:22-147.75.109.163:57436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:37.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.113:22-147.75.109.163:57442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:37.833000 audit[12017]: USER_ACCT pid=12017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:37.835000 audit[12017]: CRED_ACQ pid=12017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:37.835000 audit[12017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbd0960e0 a2=3 a3=0 items=0 ppid=1 pid=12017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:37.835000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:37.840000 audit[12017]: USER_START pid=12017 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:37.841000 audit[12020]: CRED_ACQ pid=12020 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:38.709879 sshd[12017]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:38.710000 audit[12017]: USER_END pid=12017 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:38.711000 audit[12017]: CRED_DISP pid=12017 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:38.717103 systemd[1]: sshd@86-139.178.90.113:22-147.75.109.163:57442.service: Deactivated successfully. Feb 9 10:15:38.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.113:22-147.75.109.163:57442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:38.717495 systemd[1]: session-83.scope: Deactivated successfully. Feb 9 10:15:38.717976 systemd-logind[1465]: Session 83 logged out. Waiting for processes to exit. Feb 9 10:15:38.718515 systemd[1]: Started sshd@87-139.178.90.113:22-147.75.109.163:57446.service. Feb 9 10:15:38.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.113:22-147.75.109.163:57446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:38.719035 systemd-logind[1465]: Removed session 83. Feb 9 10:15:38.755000 audit[12062]: USER_ACCT pid=12062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:38.756825 sshd[12062]: Accepted publickey for core from 147.75.109.163 port 57446 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:38.755000 audit[12062]: CRED_ACQ pid=12062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:38.755000 audit[12062]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff307f7430 a2=3 a3=0 items=0 ppid=1 pid=12062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:38.755000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:38.757633 sshd[12062]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:38.760849 systemd-logind[1465]: New session 84 of user core. Feb 9 10:15:38.762000 audit[12062]: USER_START pid=12062 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:38.763000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:38.763000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c78c00 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:15:38.763000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:15:38.763000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:38.763000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002ade6c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:15:38.763000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:15:38.763000 audit[12066]: CRED_ACQ pid=12066 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:38.761500 systemd[1]: Started session-84.scope. Feb 9 10:15:38.816000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:38.816000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:38.816000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0115c7f60 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:15:38.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:15:38.816000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00b07ac30 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:15:38.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:15:38.816000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:38.816000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c015a86b70 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:15:38.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:15:38.816000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:38.816000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c005d9a090 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:15:38.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:15:38.818000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:38.818000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0034aa1e0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:15:38.818000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:15:38.831000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:38.831000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c015564990 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:15:38.831000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:15:39.763953 sshd[12062]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:39.764000 audit[12062]: USER_END pid=12062 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:39.765000 audit[12062]: CRED_DISP pid=12062 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:39.771316 systemd[1]: sshd@87-139.178.90.113:22-147.75.109.163:57446.service: Deactivated successfully. Feb 9 10:15:39.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.113:22-147.75.109.163:57446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:39.773539 systemd[1]: session-84.scope: Deactivated successfully. Feb 9 10:15:39.776228 systemd-logind[1465]: Session 84 logged out. Waiting for processes to exit. Feb 9 10:15:39.779823 systemd[1]: Started sshd@88-139.178.90.113:22-147.75.109.163:57458.service. Feb 9 10:15:39.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.113:22-147.75.109.163:57458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:39.781655 systemd-logind[1465]: Removed session 84. Feb 9 10:15:39.799000 audit[12118]: NETFILTER_CFG table=filter:143 family=2 entries=18 op=nft_register_rule pid=12118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:15:39.799000 audit[12118]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffcfb27be30 a2=0 a3=7ffcfb27be1c items=0 ppid=2893 pid=12118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:39.799000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:15:39.800000 audit[12118]: NETFILTER_CFG table=nat:144 family=2 entries=94 op=nft_register_rule pid=12118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:15:39.800000 audit[12118]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffcfb27be30 a2=0 a3=7ffcfb27be1c items=0 ppid=2893 pid=12118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:39.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:15:39.856000 audit[12107]: USER_ACCT pid=12107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:39.858324 sshd[12107]: Accepted publickey for core from 147.75.109.163 port 57458 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:39.857000 audit[12107]: CRED_ACQ pid=12107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:39.857000 audit[12107]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc59badd20 a2=3 a3=0 items=0 ppid=1 pid=12107 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:39.857000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:39.859997 sshd[12107]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:39.862000 audit[12144]: NETFILTER_CFG table=filter:145 family=2 entries=30 op=nft_register_rule pid=12144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:15:39.862000 audit[12144]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffef3cb9770 a2=0 a3=7ffef3cb975c items=0 ppid=2893 pid=12144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:39.862000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:15:39.864572 systemd-logind[1465]: New session 85 of user core. Feb 9 10:15:39.865629 systemd[1]: Started session-85.scope. Feb 9 10:15:39.869000 audit[12107]: USER_START pid=12107 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:39.870000 audit[12145]: CRED_ACQ pid=12145 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:39.864000 audit[12144]: NETFILTER_CFG table=nat:146 family=2 entries=94 op=nft_register_rule pid=12144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:15:39.864000 audit[12144]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffef3cb9770 a2=0 a3=7ffef3cb975c items=0 ppid=2893 pid=12144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:39.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:15:40.062986 sshd[12107]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:40.061000 audit[12107]: USER_END pid=12107 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:40.062000 audit[12107]: CRED_DISP pid=12107 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:40.064820 systemd[1]: sshd@88-139.178.90.113:22-147.75.109.163:57458.service: Deactivated successfully. Feb 9 10:15:40.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.113:22-147.75.109.163:57458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:40.065177 systemd[1]: session-85.scope: Deactivated successfully. Feb 9 10:15:40.065510 systemd-logind[1465]: Session 85 logged out. Waiting for processes to exit. Feb 9 10:15:40.066114 systemd[1]: Started sshd@89-139.178.90.113:22-147.75.109.163:57464.service. Feb 9 10:15:40.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.113:22-147.75.109.163:57464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:40.066515 systemd-logind[1465]: Removed session 85. Feb 9 10:15:40.102000 audit[12167]: USER_ACCT pid=12167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:40.103965 sshd[12167]: Accepted publickey for core from 147.75.109.163 port 57464 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:40.102000 audit[12167]: CRED_ACQ pid=12167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:40.103000 audit[12167]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf2d03ff0 a2=3 a3=0 items=0 ppid=1 pid=12167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:40.103000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:40.104758 sshd[12167]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:40.107958 systemd-logind[1465]: New session 86 of user core. Feb 9 10:15:40.108544 systemd[1]: Started session-86.scope. Feb 9 10:15:40.110000 audit[12167]: USER_START pid=12167 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:40.110000 audit[12170]: CRED_ACQ pid=12170 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:40.242324 sshd[12167]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:40.241000 audit[12167]: USER_END pid=12167 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:40.241000 audit[12167]: CRED_DISP pid=12167 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:40.244512 systemd[1]: sshd@89-139.178.90.113:22-147.75.109.163:57464.service: Deactivated successfully. Feb 9 10:15:40.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.113:22-147.75.109.163:57464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:40.245239 systemd[1]: session-86.scope: Deactivated successfully. Feb 9 10:15:40.245936 systemd-logind[1465]: Session 86 logged out. Waiting for processes to exit. Feb 9 10:15:40.246883 systemd-logind[1465]: Removed session 86. Feb 9 10:15:42.809000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:42.838546 kernel: kauditd_printk_skb: 81 callbacks suppressed Feb 9 10:15:42.838645 kernel: audit: type=1400 audit(1707473742.809:2409): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:42.809000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0006b9120 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:15:43.048330 kernel: audit: type=1300 audit(1707473742.809:2409): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0006b9120 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:15:43.048360 kernel: audit: type=1327 audit(1707473742.809:2409): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:15:42.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:15:43.140817 kernel: audit: type=1400 audit(1707473742.809:2410): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:42.809000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:43.230188 kernel: audit: type=1400 audit(1707473742.809:2411): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:42.809000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:42.809000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00186b2c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:15:43.439271 kernel: audit: type=1300 audit(1707473742.809:2410): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00186b2c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:15:43.439314 kernel: audit: type=1300 audit(1707473742.809:2411): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003138340 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:15:42.809000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003138340 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:15:43.559756 kernel: audit: type=1327 audit(1707473742.809:2410): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:15:42.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:15:43.652913 kernel: audit: type=1327 audit(1707473742.809:2411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:15:42.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:15:43.745820 kernel: audit: type=1400 audit(1707473742.809:2412): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:42.809000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:42.809000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c000292ee0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:15:42.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:15:45.251268 systemd[1]: Started sshd@90-139.178.90.113:22-147.75.109.163:38228.service. Feb 9 10:15:45.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.113:22-147.75.109.163:38228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:45.288000 audit[12239]: USER_ACCT pid=12239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:45.290098 sshd[12239]: Accepted publickey for core from 147.75.109.163 port 38228 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:45.290000 audit[12239]: CRED_ACQ pid=12239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:45.290000 audit[12239]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8136c3d0 a2=3 a3=0 items=0 ppid=1 pid=12239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:45.290000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:45.292907 sshd[12239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:45.302642 systemd-logind[1465]: New session 87 of user core. Feb 9 10:15:45.304918 systemd[1]: Started session-87.scope. Feb 9 10:15:45.316000 audit[12239]: USER_START pid=12239 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:45.319000 audit[12242]: CRED_ACQ pid=12242 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:45.408256 sshd[12239]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:45.407000 audit[12239]: USER_END pid=12239 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:45.407000 audit[12239]: CRED_DISP pid=12239 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:45.410138 systemd[1]: sshd@90-139.178.90.113:22-147.75.109.163:38228.service: Deactivated successfully. Feb 9 10:15:45.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.113:22-147.75.109.163:38228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:45.410719 systemd[1]: session-87.scope: Deactivated successfully. Feb 9 10:15:45.411260 systemd-logind[1465]: Session 87 logged out. Waiting for processes to exit. Feb 9 10:15:45.412042 systemd-logind[1465]: Removed session 87. Feb 9 10:15:48.070000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:15:48.097996 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:15:48.098040 kernel: audit: type=1400 audit(1707473748.070:2422): avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:15:48.070000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d89a00 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:15:48.291498 kernel: audit: type=1300 audit(1707473748.070:2422): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d89a00 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:15:48.291532 kernel: audit: type=1327 audit(1707473748.070:2422): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:15:48.070000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:15:48.384371 kernel: audit: type=1400 audit(1707473748.138:2423): avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:15:48.138000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:15:48.138000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a7f8c0 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:15:48.577253 kernel: audit: type=1300 audit(1707473748.138:2423): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a7f8c0 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:15:48.577287 kernel: audit: type=1327 audit(1707473748.138:2423): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:15:48.138000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:15:50.419308 systemd[1]: Started sshd@91-139.178.90.113:22-147.75.109.163:38238.service. Feb 9 10:15:50.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.113:22-147.75.109.163:38238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:50.511625 kernel: audit: type=1130 audit(1707473750.419:2424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.113:22-147.75.109.163:38238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:50.561000 audit[12265]: USER_ACCT pid=12265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:50.562258 sshd[12265]: Accepted publickey for core from 147.75.109.163 port 38238 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:50.564317 sshd[12265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:50.570146 systemd-logind[1465]: New session 88 of user core. Feb 9 10:15:50.571845 systemd[1]: Started session-88.scope. Feb 9 10:15:50.563000 audit[12265]: CRED_ACQ pid=12265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:50.657536 sshd[12265]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:50.659225 systemd[1]: sshd@91-139.178.90.113:22-147.75.109.163:38238.service: Deactivated successfully. Feb 9 10:15:50.659955 systemd[1]: session-88.scope: Deactivated successfully. Feb 9 10:15:50.660397 systemd-logind[1465]: Session 88 logged out. Waiting for processes to exit. Feb 9 10:15:50.660998 systemd-logind[1465]: Removed session 88. Feb 9 10:15:50.747696 kernel: audit: type=1101 audit(1707473750.561:2425): pid=12265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:50.747735 kernel: audit: type=1103 audit(1707473750.563:2426): pid=12265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:50.747755 kernel: audit: type=1006 audit(1707473750.563:2427): pid=12265 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=88 res=1 Feb 9 10:15:50.563000 audit[12265]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd312db140 a2=3 a3=0 items=0 ppid=1 pid=12265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:50.563000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:50.578000 audit[12265]: USER_START pid=12265 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:50.580000 audit[12267]: CRED_ACQ pid=12267 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:50.657000 audit[12265]: USER_END pid=12265 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:50.657000 audit[12265]: CRED_DISP pid=12265 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:50.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.113:22-147.75.109.163:38238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:55.663900 systemd[1]: Started sshd@92-139.178.90.113:22-147.75.109.163:46816.service. Feb 9 10:15:55.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.113:22-147.75.109.163:46816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:55.691376 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:15:55.691427 kernel: audit: type=1130 audit(1707473755.663:2433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.113:22-147.75.109.163:46816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:55.813000 audit[12343]: USER_ACCT pid=12343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:55.814702 sshd[12343]: Accepted publickey for core from 147.75.109.163 port 46816 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:15:55.817802 sshd[12343]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:15:55.827642 systemd-logind[1465]: New session 89 of user core. Feb 9 10:15:55.830093 systemd[1]: Started session-89.scope. Feb 9 10:15:55.816000 audit[12343]: CRED_ACQ pid=12343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:55.918420 sshd[12343]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:55.919886 systemd[1]: sshd@92-139.178.90.113:22-147.75.109.163:46816.service: Deactivated successfully. Feb 9 10:15:55.920538 systemd[1]: session-89.scope: Deactivated successfully. Feb 9 10:15:55.920889 systemd-logind[1465]: Session 89 logged out. Waiting for processes to exit. Feb 9 10:15:55.921420 systemd-logind[1465]: Removed session 89. Feb 9 10:15:55.997536 kernel: audit: type=1101 audit(1707473755.813:2434): pid=12343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:55.997578 kernel: audit: type=1103 audit(1707473755.816:2435): pid=12343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:55.997599 kernel: audit: type=1006 audit(1707473755.816:2436): pid=12343 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=89 res=1 Feb 9 10:15:56.056291 kernel: audit: type=1300 audit(1707473755.816:2436): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde62a13f0 a2=3 a3=0 items=0 ppid=1 pid=12343 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:55.816000 audit[12343]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde62a13f0 a2=3 a3=0 items=0 ppid=1 pid=12343 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:56.148933 kernel: audit: type=1327 audit(1707473755.816:2436): proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:55.816000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:15:56.179620 kernel: audit: type=1105 audit(1707473755.840:2437): pid=12343 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:55.840000 audit[12343]: USER_START pid=12343 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:56.275153 kernel: audit: type=1103 audit(1707473755.842:2438): pid=12345 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:55.842000 audit[12345]: CRED_ACQ pid=12345 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:56.365029 kernel: audit: type=1106 audit(1707473755.918:2439): pid=12343 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:55.918000 audit[12343]: USER_END pid=12343 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:56.461105 kernel: audit: type=1104 audit(1707473755.918:2440): pid=12343 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:55.918000 audit[12343]: CRED_DISP pid=12343 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:15:55.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.113:22-147.75.109.163:46816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:00.928125 systemd[1]: Started sshd@93-139.178.90.113:22-147.75.109.163:46822.service. Feb 9 10:16:00.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.113:22-147.75.109.163:46822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:00.956407 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:16:00.956484 kernel: audit: type=1130 audit(1707473760.926:2442): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.113:22-147.75.109.163:46822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:01.076000 audit[12371]: USER_ACCT pid=12371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:01.078084 sshd[12371]: Accepted publickey for core from 147.75.109.163 port 46822 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:16:01.079857 sshd[12371]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:16:01.082301 systemd-logind[1465]: New session 90 of user core. Feb 9 10:16:01.082833 systemd[1]: Started session-90.scope. Feb 9 10:16:01.161243 sshd[12371]: pam_unix(sshd:session): session closed for user core Feb 9 10:16:01.162506 systemd[1]: sshd@93-139.178.90.113:22-147.75.109.163:46822.service: Deactivated successfully. Feb 9 10:16:01.162989 systemd[1]: session-90.scope: Deactivated successfully. Feb 9 10:16:01.163278 systemd-logind[1465]: Session 90 logged out. Waiting for processes to exit. Feb 9 10:16:01.163666 systemd-logind[1465]: Removed session 90. Feb 9 10:16:01.078000 audit[12371]: CRED_ACQ pid=12371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:01.260762 kernel: audit: type=1101 audit(1707473761.076:2443): pid=12371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:01.260804 kernel: audit: type=1103 audit(1707473761.078:2444): pid=12371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:01.260823 kernel: audit: type=1006 audit(1707473761.078:2445): pid=12371 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=90 res=1 Feb 9 10:16:01.319479 kernel: audit: type=1300 audit(1707473761.078:2445): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff40f515e0 a2=3 a3=0 items=0 ppid=1 pid=12371 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:01.078000 audit[12371]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff40f515e0 a2=3 a3=0 items=0 ppid=1 pid=12371 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:01.411619 kernel: audit: type=1327 audit(1707473761.078:2445): proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:01.078000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:01.442136 kernel: audit: type=1105 audit(1707473761.083:2446): pid=12371 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:01.083000 audit[12371]: USER_START pid=12371 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:01.536746 kernel: audit: type=1103 audit(1707473761.084:2447): pid=12373 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:01.084000 audit[12373]: CRED_ACQ pid=12373 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:01.626079 kernel: audit: type=1106 audit(1707473761.160:2448): pid=12371 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:01.160000 audit[12371]: USER_END pid=12371 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:01.721640 kernel: audit: type=1104 audit(1707473761.160:2449): pid=12371 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:01.160000 audit[12371]: CRED_DISP pid=12371 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:01.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.113:22-147.75.109.163:46822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:06.165055 systemd[1]: Started sshd@94-139.178.90.113:22-147.75.109.163:53416.service. Feb 9 10:16:06.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.113:22-147.75.109.163:53416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:06.192013 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:16:06.192113 kernel: audit: type=1130 audit(1707473766.163:2451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.113:22-147.75.109.163:53416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:06.314516 sshd[12397]: Accepted publickey for core from 147.75.109.163 port 53416 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:16:06.313000 audit[12397]: USER_ACCT pid=12397 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:06.315823 sshd[12397]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:16:06.318013 systemd-logind[1465]: New session 91 of user core. Feb 9 10:16:06.318532 systemd[1]: Started session-91.scope. Feb 9 10:16:06.403575 sshd[12397]: pam_unix(sshd:session): session closed for user core Feb 9 10:16:06.404885 systemd[1]: sshd@94-139.178.90.113:22-147.75.109.163:53416.service: Deactivated successfully. Feb 9 10:16:06.405343 systemd[1]: session-91.scope: Deactivated successfully. Feb 9 10:16:06.405645 systemd-logind[1465]: Session 91 logged out. Waiting for processes to exit. Feb 9 10:16:06.314000 audit[12397]: CRED_ACQ pid=12397 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:06.406061 systemd-logind[1465]: Removed session 91. Feb 9 10:16:06.496799 kernel: audit: type=1101 audit(1707473766.313:2452): pid=12397 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:06.496838 kernel: audit: type=1103 audit(1707473766.314:2453): pid=12397 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:06.496855 kernel: audit: type=1006 audit(1707473766.314:2454): pid=12397 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=91 res=1 Feb 9 10:16:06.555456 kernel: audit: type=1300 audit(1707473766.314:2454): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc1582110 a2=3 a3=0 items=0 ppid=1 pid=12397 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:06.314000 audit[12397]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc1582110 a2=3 a3=0 items=0 ppid=1 pid=12397 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:06.647529 kernel: audit: type=1327 audit(1707473766.314:2454): proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:06.314000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:06.678022 kernel: audit: type=1105 audit(1707473766.319:2455): pid=12397 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:06.319000 audit[12397]: USER_START pid=12397 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:06.772563 kernel: audit: type=1103 audit(1707473766.319:2456): pid=12399 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:06.319000 audit[12399]: CRED_ACQ pid=12399 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:06.861856 kernel: audit: type=1106 audit(1707473766.402:2457): pid=12397 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:06.402000 audit[12397]: USER_END pid=12397 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:06.957444 kernel: audit: type=1104 audit(1707473766.402:2458): pid=12397 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:06.402000 audit[12397]: CRED_DISP pid=12397 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:06.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.113:22-147.75.109.163:53416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:11.412840 systemd[1]: Started sshd@95-139.178.90.113:22-147.75.109.163:53418.service. Feb 9 10:16:11.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.113:22-147.75.109.163:53418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:11.439886 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:16:11.439955 kernel: audit: type=1130 audit(1707473771.412:2460): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.113:22-147.75.109.163:53418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:11.561000 audit[12423]: USER_ACCT pid=12423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:11.562711 sshd[12423]: Accepted publickey for core from 147.75.109.163 port 53418 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:16:11.563816 sshd[12423]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:16:11.566108 systemd-logind[1465]: New session 92 of user core. Feb 9 10:16:11.566708 systemd[1]: Started session-92.scope. Feb 9 10:16:11.646495 sshd[12423]: pam_unix(sshd:session): session closed for user core Feb 9 10:16:11.648006 systemd[1]: sshd@95-139.178.90.113:22-147.75.109.163:53418.service: Deactivated successfully. Feb 9 10:16:11.648461 systemd[1]: session-92.scope: Deactivated successfully. Feb 9 10:16:11.648891 systemd-logind[1465]: Session 92 logged out. Waiting for processes to exit. Feb 9 10:16:11.649423 systemd-logind[1465]: Removed session 92. Feb 9 10:16:11.563000 audit[12423]: CRED_ACQ pid=12423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:11.744840 kernel: audit: type=1101 audit(1707473771.561:2461): pid=12423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:11.744878 kernel: audit: type=1103 audit(1707473771.563:2462): pid=12423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:11.744896 kernel: audit: type=1006 audit(1707473771.563:2463): pid=12423 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=92 res=1 Feb 9 10:16:11.563000 audit[12423]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9406b700 a2=3 a3=0 items=0 ppid=1 pid=12423 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:11.895531 kernel: audit: type=1300 audit(1707473771.563:2463): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9406b700 a2=3 a3=0 items=0 ppid=1 pid=12423 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:11.895609 kernel: audit: type=1327 audit(1707473771.563:2463): proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:11.563000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:11.926084 kernel: audit: type=1105 audit(1707473771.568:2464): pid=12423 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:11.568000 audit[12423]: USER_START pid=12423 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:12.020611 kernel: audit: type=1103 audit(1707473771.568:2465): pid=12425 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:11.568000 audit[12425]: CRED_ACQ pid=12425 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:12.109926 kernel: audit: type=1106 audit(1707473771.646:2466): pid=12423 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:11.646000 audit[12423]: USER_END pid=12423 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:12.205478 kernel: audit: type=1104 audit(1707473771.646:2467): pid=12423 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:11.646000 audit[12423]: CRED_DISP pid=12423 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:11.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.113:22-147.75.109.163:53418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:16.658429 systemd[1]: Started sshd@96-139.178.90.113:22-147.75.109.163:50674.service. Feb 9 10:16:16.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.113:22-147.75.109.163:50674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:16.685924 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:16:16.685996 kernel: audit: type=1130 audit(1707473776.658:2469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.113:22-147.75.109.163:50674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:16.808356 sshd[12491]: Accepted publickey for core from 147.75.109.163 port 50674 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:16:16.807000 audit[12491]: USER_ACCT pid=12491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:16.809693 sshd[12491]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:16:16.812116 systemd-logind[1465]: New session 93 of user core. Feb 9 10:16:16.812581 systemd[1]: Started session-93.scope. Feb 9 10:16:16.889349 sshd[12491]: pam_unix(sshd:session): session closed for user core Feb 9 10:16:16.890774 systemd[1]: sshd@96-139.178.90.113:22-147.75.109.163:50674.service: Deactivated successfully. Feb 9 10:16:16.891217 systemd[1]: session-93.scope: Deactivated successfully. Feb 9 10:16:16.891504 systemd-logind[1465]: Session 93 logged out. Waiting for processes to exit. Feb 9 10:16:16.892052 systemd-logind[1465]: Removed session 93. Feb 9 10:16:16.808000 audit[12491]: CRED_ACQ pid=12491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:16.990452 kernel: audit: type=1101 audit(1707473776.807:2470): pid=12491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:16.990530 kernel: audit: type=1103 audit(1707473776.808:2471): pid=12491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:16.990577 kernel: audit: type=1006 audit(1707473776.808:2472): pid=12491 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=93 res=1 Feb 9 10:16:16.808000 audit[12491]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4be0d530 a2=3 a3=0 items=0 ppid=1 pid=12491 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:17.141143 kernel: audit: type=1300 audit(1707473776.808:2472): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4be0d530 a2=3 a3=0 items=0 ppid=1 pid=12491 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:17.141206 kernel: audit: type=1327 audit(1707473776.808:2472): proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:16.808000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:16.814000 audit[12491]: USER_START pid=12491 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:17.266175 kernel: audit: type=1105 audit(1707473776.814:2473): pid=12491 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:17.266239 kernel: audit: type=1103 audit(1707473776.814:2474): pid=12494 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:16.814000 audit[12494]: CRED_ACQ pid=12494 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:16.889000 audit[12491]: USER_END pid=12491 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:17.450984 kernel: audit: type=1106 audit(1707473776.889:2475): pid=12491 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:17.451042 kernel: audit: type=1104 audit(1707473776.889:2476): pid=12491 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:16.889000 audit[12491]: CRED_DISP pid=12491 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:16.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.113:22-147.75.109.163:50674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:21.898994 systemd[1]: Started sshd@97-139.178.90.113:22-147.75.109.163:50682.service. Feb 9 10:16:21.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.113:22-147.75.109.163:50682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:21.926011 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:16:21.926145 kernel: audit: type=1130 audit(1707473781.898:2478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.113:22-147.75.109.163:50682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:22.046941 sshd[12518]: Accepted publickey for core from 147.75.109.163 port 50682 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:16:22.046000 audit[12518]: USER_ACCT pid=12518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:22.050885 sshd[12518]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:16:22.053316 systemd-logind[1465]: New session 94 of user core. Feb 9 10:16:22.053799 systemd[1]: Started session-94.scope. Feb 9 10:16:22.050000 audit[12518]: CRED_ACQ pid=12518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:22.140291 sshd[12518]: pam_unix(sshd:session): session closed for user core Feb 9 10:16:22.141650 systemd[1]: sshd@97-139.178.90.113:22-147.75.109.163:50682.service: Deactivated successfully. Feb 9 10:16:22.142083 systemd[1]: session-94.scope: Deactivated successfully. Feb 9 10:16:22.142448 systemd-logind[1465]: Session 94 logged out. Waiting for processes to exit. Feb 9 10:16:22.143086 systemd-logind[1465]: Removed session 94. Feb 9 10:16:22.228993 kernel: audit: type=1101 audit(1707473782.046:2479): pid=12518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:22.229057 kernel: audit: type=1103 audit(1707473782.050:2480): pid=12518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:22.229094 kernel: audit: type=1006 audit(1707473782.050:2481): pid=12518 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=94 res=1 Feb 9 10:16:22.050000 audit[12518]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff19c2b190 a2=3 a3=0 items=0 ppid=1 pid=12518 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=94 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:22.379784 kernel: audit: type=1300 audit(1707473782.050:2481): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff19c2b190 a2=3 a3=0 items=0 ppid=1 pid=12518 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=94 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:22.379865 kernel: audit: type=1327 audit(1707473782.050:2481): proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:22.050000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:22.055000 audit[12518]: USER_START pid=12518 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:22.504858 kernel: audit: type=1105 audit(1707473782.055:2482): pid=12518 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:22.504958 kernel: audit: type=1103 audit(1707473782.056:2483): pid=12520 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:22.056000 audit[12520]: CRED_ACQ pid=12520 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:22.140000 audit[12518]: USER_END pid=12518 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:22.689756 kernel: audit: type=1106 audit(1707473782.140:2484): pid=12518 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:22.689834 kernel: audit: type=1104 audit(1707473782.140:2485): pid=12518 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:22.140000 audit[12518]: CRED_DISP pid=12518 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:22.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.113:22-147.75.109.163:50682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:27.142998 systemd[1]: Started sshd@98-139.178.90.113:22-147.75.109.163:54202.service. Feb 9 10:16:27.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.113:22-147.75.109.163:54202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:27.170185 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:16:27.170287 kernel: audit: type=1130 audit(1707473787.141:2487): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.113:22-147.75.109.163:54202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:27.290000 audit[12584]: USER_ACCT pid=12584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:27.292061 sshd[12584]: Accepted publickey for core from 147.75.109.163 port 54202 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:16:27.293182 sshd[12584]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:16:27.295492 systemd-logind[1465]: New session 95 of user core. Feb 9 10:16:27.296109 systemd[1]: Started session-95.scope. Feb 9 10:16:27.374642 sshd[12584]: pam_unix(sshd:session): session closed for user core Feb 9 10:16:27.376099 systemd[1]: sshd@98-139.178.90.113:22-147.75.109.163:54202.service: Deactivated successfully. Feb 9 10:16:27.376557 systemd[1]: session-95.scope: Deactivated successfully. Feb 9 10:16:27.376979 systemd-logind[1465]: Session 95 logged out. Waiting for processes to exit. Feb 9 10:16:27.377455 systemd-logind[1465]: Removed session 95. Feb 9 10:16:27.291000 audit[12584]: CRED_ACQ pid=12584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:27.475637 kernel: audit: type=1101 audit(1707473787.290:2488): pid=12584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:27.475721 kernel: audit: type=1103 audit(1707473787.291:2489): pid=12584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:27.475739 kernel: audit: type=1006 audit(1707473787.291:2490): pid=12584 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=95 res=1 Feb 9 10:16:27.534420 kernel: audit: type=1300 audit(1707473787.291:2490): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4fa0ee50 a2=3 a3=0 items=0 ppid=1 pid=12584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=95 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:27.291000 audit[12584]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4fa0ee50 a2=3 a3=0 items=0 ppid=1 pid=12584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=95 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:27.626447 kernel: audit: type=1327 audit(1707473787.291:2490): proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:27.291000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:27.656940 kernel: audit: type=1105 audit(1707473787.296:2491): pid=12584 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:27.296000 audit[12584]: USER_START pid=12584 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:27.751468 kernel: audit: type=1103 audit(1707473787.297:2492): pid=12586 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:27.297000 audit[12586]: CRED_ACQ pid=12586 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:27.373000 audit[12584]: USER_END pid=12584 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:27.936260 kernel: audit: type=1106 audit(1707473787.373:2493): pid=12584 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:27.936297 kernel: audit: type=1104 audit(1707473787.373:2494): pid=12584 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:27.373000 audit[12584]: CRED_DISP pid=12584 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:27.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.113:22-147.75.109.163:54202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:32.384512 systemd[1]: Started sshd@99-139.178.90.113:22-147.75.109.163:54216.service. Feb 9 10:16:32.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.113:22-147.75.109.163:54216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:32.411507 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:16:32.411547 kernel: audit: type=1130 audit(1707473792.383:2496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.113:22-147.75.109.163:54216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:32.532000 audit[12612]: USER_ACCT pid=12612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:32.533477 sshd[12612]: Accepted publickey for core from 147.75.109.163 port 54216 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:16:32.534889 sshd[12612]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:16:32.537456 systemd-logind[1465]: New session 96 of user core. Feb 9 10:16:32.537951 systemd[1]: Started session-96.scope. Feb 9 10:16:32.615706 sshd[12612]: pam_unix(sshd:session): session closed for user core Feb 9 10:16:32.617181 systemd[1]: sshd@99-139.178.90.113:22-147.75.109.163:54216.service: Deactivated successfully. Feb 9 10:16:32.617627 systemd[1]: session-96.scope: Deactivated successfully. Feb 9 10:16:32.618036 systemd-logind[1465]: Session 96 logged out. Waiting for processes to exit. Feb 9 10:16:32.618486 systemd-logind[1465]: Removed session 96. Feb 9 10:16:32.533000 audit[12612]: CRED_ACQ pid=12612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:32.715370 kernel: audit: type=1101 audit(1707473792.532:2497): pid=12612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:32.715401 kernel: audit: type=1103 audit(1707473792.533:2498): pid=12612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:32.715415 kernel: audit: type=1006 audit(1707473792.533:2499): pid=12612 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=96 res=1 Feb 9 10:16:32.773981 kernel: audit: type=1300 audit(1707473792.533:2499): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2a395ad0 a2=3 a3=0 items=0 ppid=1 pid=12612 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=96 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:32.533000 audit[12612]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2a395ad0 a2=3 a3=0 items=0 ppid=1 pid=12612 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=96 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:32.865940 kernel: audit: type=1327 audit(1707473792.533:2499): proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:32.533000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:32.896425 kernel: audit: type=1105 audit(1707473792.538:2500): pid=12612 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:32.538000 audit[12612]: USER_START pid=12612 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:32.538000 audit[12614]: CRED_ACQ pid=12614 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:33.080274 kernel: audit: type=1103 audit(1707473792.538:2501): pid=12614 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:33.080339 kernel: audit: type=1106 audit(1707473792.614:2502): pid=12612 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:32.614000 audit[12612]: USER_END pid=12612 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:33.175810 kernel: audit: type=1104 audit(1707473792.614:2503): pid=12612 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:32.614000 audit[12612]: CRED_DISP pid=12612 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:32.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.113:22-147.75.109.163:54216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:37.627138 systemd[1]: Started sshd@100-139.178.90.113:22-147.75.109.163:47174.service. Feb 9 10:16:37.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.113:22-147.75.109.163:47174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:37.654368 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:16:37.654442 kernel: audit: type=1130 audit(1707473797.625:2505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.113:22-147.75.109.163:47174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:37.776000 audit[12636]: USER_ACCT pid=12636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:37.777628 sshd[12636]: Accepted publickey for core from 147.75.109.163 port 47174 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:16:37.779239 sshd[12636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:16:37.781895 systemd-logind[1465]: New session 97 of user core. Feb 9 10:16:37.782330 systemd[1]: Started session-97.scope. Feb 9 10:16:37.777000 audit[12636]: CRED_ACQ pid=12636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:37.871015 sshd[12636]: pam_unix(sshd:session): session closed for user core Feb 9 10:16:37.872303 systemd[1]: sshd@100-139.178.90.113:22-147.75.109.163:47174.service: Deactivated successfully. Feb 9 10:16:37.872740 systemd[1]: session-97.scope: Deactivated successfully. Feb 9 10:16:37.873061 systemd-logind[1465]: Session 97 logged out. Waiting for processes to exit. Feb 9 10:16:37.873718 systemd-logind[1465]: Removed session 97. Feb 9 10:16:37.959550 kernel: audit: type=1101 audit(1707473797.776:2506): pid=12636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:37.959602 kernel: audit: type=1103 audit(1707473797.777:2507): pid=12636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:37.959621 kernel: audit: type=1006 audit(1707473797.777:2508): pid=12636 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=97 res=1 Feb 9 10:16:38.018188 kernel: audit: type=1300 audit(1707473797.777:2508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6c803050 a2=3 a3=0 items=0 ppid=1 pid=12636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=97 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:37.777000 audit[12636]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6c803050 a2=3 a3=0 items=0 ppid=1 pid=12636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=97 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:38.110160 kernel: audit: type=1327 audit(1707473797.777:2508): proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:37.777000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:38.140626 kernel: audit: type=1105 audit(1707473797.783:2509): pid=12636 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:37.783000 audit[12636]: USER_START pid=12636 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:38.235080 kernel: audit: type=1103 audit(1707473797.783:2510): pid=12638 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:37.783000 audit[12638]: CRED_ACQ pid=12638 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:38.324389 kernel: audit: type=1106 audit(1707473797.868:2511): pid=12636 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:37.868000 audit[12636]: USER_END pid=12636 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:38.419832 kernel: audit: type=1104 audit(1707473797.868:2512): pid=12636 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:37.868000 audit[12636]: CRED_DISP pid=12636 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:37.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.113:22-147.75.109.163:47174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:38.764000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:38.764000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d172c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:16:38.764000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:16:38.764000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:38.764000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018a0680 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:16:38.764000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:16:38.817000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:38.817000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0149fce70 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:16:38.817000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:16:38.817000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:38.817000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c002e1dac0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:16:38.817000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:16:38.818000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:38.818000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c010a70e10 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:16:38.818000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:16:38.818000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:38.818000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c013cb2b10 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:16:38.818000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:16:38.818000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:38.818000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002e1dae0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:16:38.818000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:16:38.833000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:38.833000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c003f38ea0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:16:38.833000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:16:42.811000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:42.839429 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:16:42.839476 kernel: audit: type=1400 audit(1707473802.811:2522): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:42.874034 systemd[1]: Started sshd@101-139.178.90.113:22-147.75.109.163:47180.service. Feb 9 10:16:42.811000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f155e0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:16:43.048768 kernel: audit: type=1300 audit(1707473802.811:2522): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f155e0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:16:43.048815 kernel: audit: type=1327 audit(1707473802.811:2522): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:16:42.811000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:16:43.081064 sshd[12710]: Accepted publickey for core from 147.75.109.163 port 47180 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:16:43.082871 sshd[12710]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:16:43.085721 systemd-logind[1465]: New session 98 of user core. Feb 9 10:16:43.086398 systemd[1]: Started session-98.scope. Feb 9 10:16:42.811000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:43.230512 kernel: audit: type=1400 audit(1707473802.811:2523): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:43.230590 kernel: audit: type=1300 audit(1707473802.811:2523): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f15600 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:16:42.811000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f15600 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:16:43.232474 sshd[12710]: pam_unix(sshd:session): session closed for user core Feb 9 10:16:43.233997 systemd[1]: sshd@101-139.178.90.113:22-147.75.109.163:47180.service: Deactivated successfully. Feb 9 10:16:43.234474 systemd[1]: session-98.scope: Deactivated successfully. Feb 9 10:16:43.234841 systemd-logind[1465]: Session 98 logged out. Waiting for processes to exit. Feb 9 10:16:43.235346 systemd-logind[1465]: Removed session 98. Feb 9 10:16:42.811000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:16:43.442497 kernel: audit: type=1327 audit(1707473802.811:2523): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:16:43.442581 kernel: audit: type=1400 audit(1707473802.811:2524): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:42.811000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:43.532531 kernel: audit: type=1300 audit(1707473802.811:2524): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0006b9e40 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:16:42.811000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0006b9e40 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:16:42.811000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:16:43.745459 kernel: audit: type=1327 audit(1707473802.811:2524): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:16:43.745501 kernel: audit: type=1400 audit(1707473802.812:2525): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:42.812000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:16:42.812000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f15620 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:16:42.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:16:42.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.113:22-147.75.109.163:47180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:43.080000 audit[12710]: USER_ACCT pid=12710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:43.082000 audit[12710]: CRED_ACQ pid=12710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:43.082000 audit[12710]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe299104a0 a2=3 a3=0 items=0 ppid=1 pid=12710 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=98 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:43.082000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:43.088000 audit[12710]: USER_START pid=12710 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:43.088000 audit[12712]: CRED_ACQ pid=12712 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:43.232000 audit[12710]: USER_END pid=12710 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:43.232000 audit[12710]: CRED_DISP pid=12710 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:43.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.113:22-147.75.109.163:47180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:48.071000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:16:48.099338 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:16:48.099412 kernel: audit: type=1400 audit(1707473808.071:2535): avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:16:48.071000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002091be0 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:16:48.236079 systemd[1]: Started sshd@102-139.178.90.113:22-147.75.109.163:41244.service. Feb 9 10:16:48.292204 kernel: audit: type=1300 audit(1707473808.071:2535): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002091be0 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:16:48.292243 kernel: audit: type=1327 audit(1707473808.071:2535): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:16:48.071000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:16:48.384777 kernel: audit: type=1400 audit(1707473808.139:2536): avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:16:48.139000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:16:48.417473 sshd[12762]: Accepted publickey for core from 147.75.109.163 port 41244 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:16:48.418878 sshd[12762]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:16:48.421185 systemd-logind[1465]: New session 99 of user core. Feb 9 10:16:48.421892 systemd[1]: Started session-99.scope. Feb 9 10:16:48.139000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019d3620 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:16:48.497664 sshd[12762]: pam_unix(sshd:session): session closed for user core Feb 9 10:16:48.499145 systemd[1]: sshd@102-139.178.90.113:22-147.75.109.163:41244.service: Deactivated successfully. Feb 9 10:16:48.499630 systemd[1]: session-99.scope: Deactivated successfully. Feb 9 10:16:48.499999 systemd-logind[1465]: Session 99 logged out. Waiting for processes to exit. Feb 9 10:16:48.500431 systemd-logind[1465]: Removed session 99. Feb 9 10:16:48.575242 kernel: audit: type=1300 audit(1707473808.139:2536): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019d3620 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:16:48.575281 kernel: audit: type=1327 audit(1707473808.139:2536): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:16:48.139000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:16:48.668630 kernel: audit: type=1130 audit(1707473808.235:2537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.113:22-147.75.109.163:41244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:48.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.113:22-147.75.109.163:41244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:48.416000 audit[12762]: USER_ACCT pid=12762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:48.850776 kernel: audit: type=1101 audit(1707473808.416:2538): pid=12762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:48.850809 kernel: audit: type=1103 audit(1707473808.418:2539): pid=12762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:48.418000 audit[12762]: CRED_ACQ pid=12762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:49.001335 kernel: audit: type=1006 audit(1707473808.418:2540): pid=12762 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=99 res=1 Feb 9 10:16:48.418000 audit[12762]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd60d50f70 a2=3 a3=0 items=0 ppid=1 pid=12762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=99 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:48.418000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:48.423000 audit[12762]: USER_START pid=12762 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:48.424000 audit[12764]: CRED_ACQ pid=12764 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:48.497000 audit[12762]: USER_END pid=12762 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:48.497000 audit[12762]: CRED_DISP pid=12762 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:48.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.113:22-147.75.109.163:41244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:53.511839 systemd[1]: Started sshd@103-139.178.90.113:22-147.75.109.163:41246.service. Feb 9 10:16:53.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.113:22-147.75.109.163:41246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:53.539890 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:16:53.539965 kernel: audit: type=1130 audit(1707473813.512:2546): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.113:22-147.75.109.163:41246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:53.663450 sshd[12824]: Accepted publickey for core from 147.75.109.163 port 41246 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:16:53.662000 audit[12824]: USER_ACCT pid=12824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:53.664684 sshd[12824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:16:53.667123 systemd-logind[1465]: New session 100 of user core. Feb 9 10:16:53.667849 systemd[1]: Started session-100.scope. Feb 9 10:16:53.663000 audit[12824]: CRED_ACQ pid=12824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:53.758562 kernel: audit: type=1101 audit(1707473813.662:2547): pid=12824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:53.758628 kernel: audit: type=1103 audit(1707473813.663:2548): pid=12824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:53.759963 sshd[12824]: pam_unix(sshd:session): session closed for user core Feb 9 10:16:53.761253 systemd[1]: sshd@103-139.178.90.113:22-147.75.109.163:41246.service: Deactivated successfully. Feb 9 10:16:53.761769 systemd[1]: session-100.scope: Deactivated successfully. Feb 9 10:16:53.762196 systemd-logind[1465]: Session 100 logged out. Waiting for processes to exit. Feb 9 10:16:53.762694 systemd-logind[1465]: Removed session 100. Feb 9 10:16:53.907317 kernel: audit: type=1006 audit(1707473813.663:2549): pid=12824 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=100 res=1 Feb 9 10:16:53.907350 kernel: audit: type=1300 audit(1707473813.663:2549): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde422aa00 a2=3 a3=0 items=0 ppid=1 pid=12824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=100 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:53.663000 audit[12824]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde422aa00 a2=3 a3=0 items=0 ppid=1 pid=12824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=100 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:53.999832 kernel: audit: type=1327 audit(1707473813.663:2549): proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:53.663000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:54.030459 kernel: audit: type=1105 audit(1707473813.669:2550): pid=12824 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:53.669000 audit[12824]: USER_START pid=12824 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:54.126116 kernel: audit: type=1103 audit(1707473813.670:2551): pid=12826 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:53.670000 audit[12826]: CRED_ACQ pid=12826 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:54.216007 kernel: audit: type=1106 audit(1707473813.759:2552): pid=12824 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:53.759000 audit[12824]: USER_END pid=12824 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:54.312151 kernel: audit: type=1104 audit(1707473813.760:2553): pid=12824 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:53.760000 audit[12824]: CRED_DISP pid=12824 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:53.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.113:22-147.75.109.163:41246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:58.769197 systemd[1]: Started sshd@104-139.178.90.113:22-147.75.109.163:52112.service. Feb 9 10:16:58.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.113:22-147.75.109.163:52112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:58.796365 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:16:58.796406 kernel: audit: type=1130 audit(1707473818.768:2555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.113:22-147.75.109.163:52112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:16:58.919000 audit[12851]: USER_ACCT pid=12851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:58.920480 sshd[12851]: Accepted publickey for core from 147.75.109.163 port 52112 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:16:58.921850 sshd[12851]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:16:58.924537 systemd-logind[1465]: New session 101 of user core. Feb 9 10:16:58.925135 systemd[1]: Started session-101.scope. Feb 9 10:16:58.921000 audit[12851]: CRED_ACQ pid=12851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:59.014887 sshd[12851]: pam_unix(sshd:session): session closed for user core Feb 9 10:16:59.016290 systemd[1]: sshd@104-139.178.90.113:22-147.75.109.163:52112.service: Deactivated successfully. Feb 9 10:16:59.016751 systemd[1]: session-101.scope: Deactivated successfully. Feb 9 10:16:59.017162 systemd-logind[1465]: Session 101 logged out. Waiting for processes to exit. Feb 9 10:16:59.017643 systemd-logind[1465]: Removed session 101. Feb 9 10:16:59.103527 kernel: audit: type=1101 audit(1707473818.919:2556): pid=12851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:59.103569 kernel: audit: type=1103 audit(1707473818.921:2557): pid=12851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:59.103589 kernel: audit: type=1006 audit(1707473818.921:2558): pid=12851 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=101 res=1 Feb 9 10:16:59.162280 kernel: audit: type=1300 audit(1707473818.921:2558): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc870da070 a2=3 a3=0 items=0 ppid=1 pid=12851 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=101 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:58.921000 audit[12851]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc870da070 a2=3 a3=0 items=0 ppid=1 pid=12851 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=101 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:16:59.254489 kernel: audit: type=1327 audit(1707473818.921:2558): proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:58.921000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:16:59.285007 kernel: audit: type=1105 audit(1707473818.926:2559): pid=12851 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:58.926000 audit[12851]: USER_START pid=12851 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:59.379581 kernel: audit: type=1103 audit(1707473818.927:2560): pid=12854 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:58.927000 audit[12854]: CRED_ACQ pid=12854 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:59.468851 kernel: audit: type=1106 audit(1707473819.014:2561): pid=12851 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:59.014000 audit[12851]: USER_END pid=12851 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:59.564390 kernel: audit: type=1104 audit(1707473819.015:2562): pid=12851 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:59.015000 audit[12851]: CRED_DISP pid=12851 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:16:59.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.113:22-147.75.109.163:52112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:04.026719 systemd[1]: Started sshd@105-139.178.90.113:22-147.75.109.163:52114.service. Feb 9 10:17:04.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.113:22-147.75.109.163:52114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:04.053488 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:17:04.053531 kernel: audit: type=1130 audit(1707473824.025:2564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.113:22-147.75.109.163:52114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:04.172000 audit[12880]: USER_ACCT pid=12880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:04.174078 sshd[12880]: Accepted publickey for core from 147.75.109.163 port 52114 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:17:04.175858 sshd[12880]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:17:04.178359 systemd-logind[1465]: New session 102 of user core. Feb 9 10:17:04.178816 systemd[1]: Started session-102.scope. Feb 9 10:17:04.174000 audit[12880]: CRED_ACQ pid=12880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:04.269143 sshd[12880]: pam_unix(sshd:session): session closed for user core Feb 9 10:17:04.270372 systemd[1]: sshd@105-139.178.90.113:22-147.75.109.163:52114.service: Deactivated successfully. Feb 9 10:17:04.270807 systemd[1]: session-102.scope: Deactivated successfully. Feb 9 10:17:04.271256 systemd-logind[1465]: Session 102 logged out. Waiting for processes to exit. Feb 9 10:17:04.271874 systemd-logind[1465]: Removed session 102. Feb 9 10:17:04.357770 kernel: audit: type=1101 audit(1707473824.172:2565): pid=12880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:04.357811 kernel: audit: type=1103 audit(1707473824.174:2566): pid=12880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:04.357828 kernel: audit: type=1006 audit(1707473824.174:2567): pid=12880 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=102 res=1 Feb 9 10:17:04.416491 kernel: audit: type=1300 audit(1707473824.174:2567): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc192f9e0 a2=3 a3=0 items=0 ppid=1 pid=12880 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=102 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:04.174000 audit[12880]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc192f9e0 a2=3 a3=0 items=0 ppid=1 pid=12880 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=102 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:04.508635 kernel: audit: type=1327 audit(1707473824.174:2567): proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:04.174000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:04.539073 kernel: audit: type=1105 audit(1707473824.179:2568): pid=12880 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:04.179000 audit[12880]: USER_START pid=12880 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:04.633569 kernel: audit: type=1103 audit(1707473824.180:2569): pid=12882 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:04.180000 audit[12882]: CRED_ACQ pid=12882 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:04.722834 kernel: audit: type=1106 audit(1707473824.268:2570): pid=12880 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:04.268000 audit[12880]: USER_END pid=12880 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:04.268000 audit[12880]: CRED_DISP pid=12880 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:04.907760 kernel: audit: type=1104 audit(1707473824.268:2571): pid=12880 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:04.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.113:22-147.75.109.163:52114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:09.279094 systemd[1]: Started sshd@106-139.178.90.113:22-147.75.109.163:57356.service. Feb 9 10:17:09.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.113:22-147.75.109.163:57356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:09.306231 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:17:09.306329 kernel: audit: type=1130 audit(1707473829.277:2573): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.113:22-147.75.109.163:57356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:09.426000 audit[12906]: USER_ACCT pid=12906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:09.428351 sshd[12906]: Accepted publickey for core from 147.75.109.163 port 57356 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:17:09.429861 sshd[12906]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:17:09.432279 systemd-logind[1465]: New session 103 of user core. Feb 9 10:17:09.432795 systemd[1]: Started session-103.scope. Feb 9 10:17:09.519008 sshd[12906]: pam_unix(sshd:session): session closed for user core Feb 9 10:17:09.428000 audit[12906]: CRED_ACQ pid=12906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:09.520341 systemd[1]: sshd@106-139.178.90.113:22-147.75.109.163:57356.service: Deactivated successfully. Feb 9 10:17:09.520785 systemd[1]: session-103.scope: Deactivated successfully. Feb 9 10:17:09.521195 systemd-logind[1465]: Session 103 logged out. Waiting for processes to exit. Feb 9 10:17:09.521649 systemd-logind[1465]: Removed session 103. Feb 9 10:17:09.610346 kernel: audit: type=1101 audit(1707473829.426:2574): pid=12906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:09.610389 kernel: audit: type=1103 audit(1707473829.428:2575): pid=12906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:09.610408 kernel: audit: type=1006 audit(1707473829.428:2576): pid=12906 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=103 res=1 Feb 9 10:17:09.669231 kernel: audit: type=1300 audit(1707473829.428:2576): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe71765d00 a2=3 a3=0 items=0 ppid=1 pid=12906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=103 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:09.428000 audit[12906]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe71765d00 a2=3 a3=0 items=0 ppid=1 pid=12906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=103 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:09.761375 kernel: audit: type=1327 audit(1707473829.428:2576): proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:09.428000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:09.791870 kernel: audit: type=1105 audit(1707473829.433:2577): pid=12906 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:09.433000 audit[12906]: USER_START pid=12906 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:09.886505 kernel: audit: type=1103 audit(1707473829.433:2578): pid=12908 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:09.433000 audit[12908]: CRED_ACQ pid=12908 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:09.975810 kernel: audit: type=1106 audit(1707473829.518:2579): pid=12906 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:09.518000 audit[12906]: USER_END pid=12906 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:10.071427 kernel: audit: type=1104 audit(1707473829.518:2580): pid=12906 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:09.518000 audit[12906]: CRED_DISP pid=12906 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:09.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.113:22-147.75.109.163:57356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:14.529667 systemd[1]: Started sshd@107-139.178.90.113:22-147.75.109.163:40620.service. Feb 9 10:17:14.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.113:22-147.75.109.163:40620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:14.556568 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:17:14.556626 kernel: audit: type=1130 audit(1707473834.528:2582): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.113:22-147.75.109.163:40620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:14.677000 audit[12975]: USER_ACCT pid=12975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:14.679477 sshd[12975]: Accepted publickey for core from 147.75.109.163 port 40620 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:17:14.680858 sshd[12975]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:17:14.683243 systemd-logind[1465]: New session 104 of user core. Feb 9 10:17:14.683940 systemd[1]: Started session-104.scope. Feb 9 10:17:14.762706 sshd[12975]: pam_unix(sshd:session): session closed for user core Feb 9 10:17:14.763989 systemd[1]: sshd@107-139.178.90.113:22-147.75.109.163:40620.service: Deactivated successfully. Feb 9 10:17:14.764430 systemd[1]: session-104.scope: Deactivated successfully. Feb 9 10:17:14.764869 systemd-logind[1465]: Session 104 logged out. Waiting for processes to exit. Feb 9 10:17:14.765442 systemd-logind[1465]: Removed session 104. Feb 9 10:17:14.679000 audit[12975]: CRED_ACQ pid=12975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:14.771638 kernel: audit: type=1101 audit(1707473834.677:2583): pid=12975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:14.771675 kernel: audit: type=1103 audit(1707473834.679:2584): pid=12975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:14.920438 kernel: audit: type=1006 audit(1707473834.679:2585): pid=12975 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=104 res=1 Feb 9 10:17:14.920474 kernel: audit: type=1300 audit(1707473834.679:2585): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdb120a10 a2=3 a3=0 items=0 ppid=1 pid=12975 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=104 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:14.679000 audit[12975]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdb120a10 a2=3 a3=0 items=0 ppid=1 pid=12975 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=104 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:15.012640 kernel: audit: type=1327 audit(1707473834.679:2585): proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:14.679000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:15.043178 kernel: audit: type=1105 audit(1707473834.684:2586): pid=12975 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:14.684000 audit[12975]: USER_START pid=12975 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:15.137874 kernel: audit: type=1103 audit(1707473834.685:2587): pid=12977 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:14.685000 audit[12977]: CRED_ACQ pid=12977 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:15.227267 kernel: audit: type=1106 audit(1707473834.761:2588): pid=12975 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:14.761000 audit[12975]: USER_END pid=12975 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:15.323020 kernel: audit: type=1104 audit(1707473834.761:2589): pid=12975 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:14.761000 audit[12975]: CRED_DISP pid=12975 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:14.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.113:22-147.75.109.163:40620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:19.771963 systemd[1]: Started sshd@108-139.178.90.113:22-147.75.109.163:40634.service. Feb 9 10:17:19.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.113:22-147.75.109.163:40634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:19.799044 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:17:19.799134 kernel: audit: type=1130 audit(1707473839.770:2591): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.113:22-147.75.109.163:40634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:19.921000 audit[13001]: USER_ACCT pid=13001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:19.922077 sshd[13001]: Accepted publickey for core from 147.75.109.163 port 40634 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:17:19.922867 sshd[13001]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:17:19.925255 systemd-logind[1465]: New session 105 of user core. Feb 9 10:17:19.925734 systemd[1]: Started session-105.scope. Feb 9 10:17:19.921000 audit[13001]: CRED_ACQ pid=13001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:20.016028 sshd[13001]: pam_unix(sshd:session): session closed for user core Feb 9 10:17:20.017424 systemd[1]: sshd@108-139.178.90.113:22-147.75.109.163:40634.service: Deactivated successfully. Feb 9 10:17:20.017868 systemd[1]: session-105.scope: Deactivated successfully. Feb 9 10:17:20.018258 systemd-logind[1465]: Session 105 logged out. Waiting for processes to exit. Feb 9 10:17:20.018904 systemd-logind[1465]: Removed session 105. Feb 9 10:17:20.104639 kernel: audit: type=1101 audit(1707473839.921:2592): pid=13001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:20.104678 kernel: audit: type=1103 audit(1707473839.921:2593): pid=13001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:20.104696 kernel: audit: type=1006 audit(1707473839.921:2594): pid=13001 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=105 res=1 Feb 9 10:17:20.163500 kernel: audit: type=1300 audit(1707473839.921:2594): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc26e569a0 a2=3 a3=0 items=0 ppid=1 pid=13001 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=105 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:19.921000 audit[13001]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc26e569a0 a2=3 a3=0 items=0 ppid=1 pid=13001 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=105 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:20.255739 kernel: audit: type=1327 audit(1707473839.921:2594): proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:19.921000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:20.286281 kernel: audit: type=1105 audit(1707473839.926:2595): pid=13001 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:19.926000 audit[13001]: USER_START pid=13001 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:20.380951 kernel: audit: type=1103 audit(1707473839.927:2596): pid=13003 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:19.927000 audit[13003]: CRED_ACQ pid=13003 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:20.470339 kernel: audit: type=1106 audit(1707473840.015:2597): pid=13001 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:20.015000 audit[13001]: USER_END pid=13001 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:20.565988 kernel: audit: type=1104 audit(1707473840.015:2598): pid=13001 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:20.015000 audit[13001]: CRED_DISP pid=13001 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:20.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.113:22-147.75.109.163:40634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:25.025941 systemd[1]: Started sshd@109-139.178.90.113:22-147.75.109.163:33538.service. Feb 9 10:17:25.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.113:22-147.75.109.163:33538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:25.052905 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:17:25.052960 kernel: audit: type=1130 audit(1707473845.025:2600): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.113:22-147.75.109.163:33538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:25.175000 audit[13064]: USER_ACCT pid=13064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:25.176097 sshd[13064]: Accepted publickey for core from 147.75.109.163 port 33538 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:17:25.176807 sshd[13064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:17:25.179298 systemd-logind[1465]: New session 106 of user core. Feb 9 10:17:25.179802 systemd[1]: Started session-106.scope. Feb 9 10:17:25.261957 sshd[13064]: pam_unix(sshd:session): session closed for user core Feb 9 10:17:25.263356 systemd[1]: sshd@109-139.178.90.113:22-147.75.109.163:33538.service: Deactivated successfully. Feb 9 10:17:25.263801 systemd[1]: session-106.scope: Deactivated successfully. Feb 9 10:17:25.264215 systemd-logind[1465]: Session 106 logged out. Waiting for processes to exit. Feb 9 10:17:25.264732 systemd-logind[1465]: Removed session 106. Feb 9 10:17:25.175000 audit[13064]: CRED_ACQ pid=13064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:25.359854 kernel: audit: type=1101 audit(1707473845.175:2601): pid=13064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:25.359897 kernel: audit: type=1103 audit(1707473845.175:2602): pid=13064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:25.359923 kernel: audit: type=1006 audit(1707473845.175:2603): pid=13064 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=106 res=1 Feb 9 10:17:25.418639 kernel: audit: type=1300 audit(1707473845.175:2603): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff77e427e0 a2=3 a3=0 items=0 ppid=1 pid=13064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=106 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:25.175000 audit[13064]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff77e427e0 a2=3 a3=0 items=0 ppid=1 pid=13064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=106 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:25.510816 kernel: audit: type=1327 audit(1707473845.175:2603): proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:25.175000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:25.541296 kernel: audit: type=1105 audit(1707473845.180:2604): pid=13064 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:25.180000 audit[13064]: USER_START pid=13064 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:25.635916 kernel: audit: type=1103 audit(1707473845.181:2605): pid=13066 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:25.181000 audit[13066]: CRED_ACQ pid=13066 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:25.725408 kernel: audit: type=1106 audit(1707473845.261:2606): pid=13064 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:25.261000 audit[13064]: USER_END pid=13064 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:25.821089 kernel: audit: type=1104 audit(1707473845.261:2607): pid=13064 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:25.261000 audit[13064]: CRED_DISP pid=13064 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:25.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.113:22-147.75.109.163:33538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:30.272548 systemd[1]: Started sshd@110-139.178.90.113:22-147.75.109.163:33548.service. Feb 9 10:17:30.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.113:22-147.75.109.163:33548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:30.299957 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:17:30.300030 kernel: audit: type=1130 audit(1707473850.272:2609): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.113:22-147.75.109.163:33548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:30.421000 audit[13105]: USER_ACCT pid=13105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:30.422626 sshd[13105]: Accepted publickey for core from 147.75.109.163 port 33548 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:17:30.423863 sshd[13105]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:17:30.426205 systemd-logind[1465]: New session 107 of user core. Feb 9 10:17:30.426661 systemd[1]: Started session-107.scope. Feb 9 10:17:30.507620 sshd[13105]: pam_unix(sshd:session): session closed for user core Feb 9 10:17:30.509124 systemd[1]: sshd@110-139.178.90.113:22-147.75.109.163:33548.service: Deactivated successfully. Feb 9 10:17:30.509629 systemd[1]: session-107.scope: Deactivated successfully. Feb 9 10:17:30.510032 systemd-logind[1465]: Session 107 logged out. Waiting for processes to exit. Feb 9 10:17:30.510466 systemd-logind[1465]: Removed session 107. Feb 9 10:17:30.423000 audit[13105]: CRED_ACQ pid=13105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:30.604632 kernel: audit: type=1101 audit(1707473850.421:2610): pid=13105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:30.604680 kernel: audit: type=1103 audit(1707473850.423:2611): pid=13105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:30.604699 kernel: audit: type=1006 audit(1707473850.423:2612): pid=13105 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=107 res=1 Feb 9 10:17:30.663394 kernel: audit: type=1300 audit(1707473850.423:2612): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6ee60a80 a2=3 a3=0 items=0 ppid=1 pid=13105 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=107 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:30.423000 audit[13105]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6ee60a80 a2=3 a3=0 items=0 ppid=1 pid=13105 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=107 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:30.755618 kernel: audit: type=1327 audit(1707473850.423:2612): proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:30.423000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:30.428000 audit[13105]: USER_START pid=13105 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:30.880628 kernel: audit: type=1105 audit(1707473850.428:2613): pid=13105 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:30.880660 kernel: audit: type=1103 audit(1707473850.429:2614): pid=13107 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:30.429000 audit[13107]: CRED_ACQ pid=13107 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:30.969852 kernel: audit: type=1106 audit(1707473850.507:2615): pid=13105 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:30.507000 audit[13105]: USER_END pid=13105 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:31.065380 kernel: audit: type=1104 audit(1707473850.507:2616): pid=13105 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:30.507000 audit[13105]: CRED_DISP pid=13105 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:30.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.113:22-147.75.109.163:33548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:35.519726 systemd[1]: Started sshd@111-139.178.90.113:22-147.75.109.163:33352.service. Feb 9 10:17:35.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.113:22-147.75.109.163:33352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:35.547098 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:17:35.547161 kernel: audit: type=1130 audit(1707473855.519:2618): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.113:22-147.75.109.163:33352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:35.668000 audit[13131]: USER_ACCT pid=13131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:35.669433 sshd[13131]: Accepted publickey for core from 147.75.109.163 port 33352 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:17:35.670858 sshd[13131]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:17:35.673259 systemd-logind[1465]: New session 108 of user core. Feb 9 10:17:35.673680 systemd[1]: Started session-108.scope. Feb 9 10:17:35.670000 audit[13131]: CRED_ACQ pid=13131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:35.763578 kernel: audit: type=1101 audit(1707473855.668:2619): pid=13131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:35.763668 kernel: audit: type=1103 audit(1707473855.670:2620): pid=13131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:35.764941 sshd[13131]: pam_unix(sshd:session): session closed for user core Feb 9 10:17:35.766323 systemd[1]: sshd@111-139.178.90.113:22-147.75.109.163:33352.service: Deactivated successfully. Feb 9 10:17:35.766760 systemd[1]: session-108.scope: Deactivated successfully. Feb 9 10:17:35.767157 systemd-logind[1465]: Session 108 logged out. Waiting for processes to exit. Feb 9 10:17:35.767637 systemd-logind[1465]: Removed session 108. Feb 9 10:17:35.912105 kernel: audit: type=1006 audit(1707473855.670:2621): pid=13131 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=108 res=1 Feb 9 10:17:35.912193 kernel: audit: type=1300 audit(1707473855.670:2621): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddf48ad70 a2=3 a3=0 items=0 ppid=1 pid=13131 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=108 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:35.670000 audit[13131]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddf48ad70 a2=3 a3=0 items=0 ppid=1 pid=13131 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=108 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:35.670000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:36.034580 kernel: audit: type=1327 audit(1707473855.670:2621): proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:36.034627 kernel: audit: type=1105 audit(1707473855.675:2622): pid=13131 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:35.675000 audit[13131]: USER_START pid=13131 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:35.676000 audit[13133]: CRED_ACQ pid=13133 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:36.218310 kernel: audit: type=1103 audit(1707473855.676:2623): pid=13133 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:36.218365 kernel: audit: type=1106 audit(1707473855.765:2624): pid=13131 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:35.765000 audit[13131]: USER_END pid=13131 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:35.765000 audit[13131]: CRED_DISP pid=13131 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:36.403265 kernel: audit: type=1104 audit(1707473855.765:2625): pid=13131 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:35.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.113:22-147.75.109.163:33352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:38.766000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:17:38.766000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e89410 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:17:38.766000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:17:38.766000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:17:38.766000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001787500 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:17:38.766000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:17:38.818000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:17:38.818000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c013934cc0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:17:38.818000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:17:38.818000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:17:38.818000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00d38e0a0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:17:38.818000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:17:38.818000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:17:38.818000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00bf68510 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:17:38.818000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:17:38.818000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:17:38.818000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c014241b60 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:17:38.818000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:17:38.820000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:17:38.820000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00fadadc0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:17:38.820000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:17:38.833000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:17:38.833000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00bf68570 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:17:38.833000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:17:40.774321 systemd[1]: Started sshd@112-139.178.90.113:22-147.75.109.163:33368.service. Feb 9 10:17:40.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.113:22-147.75.109.163:33368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:40.801699 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:17:40.801751 kernel: audit: type=1130 audit(1707473860.773:2635): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.113:22-147.75.109.163:33368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:40.923000 audit[13175]: USER_ACCT pid=13175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:40.924026 sshd[13175]: Accepted publickey for core from 147.75.109.163 port 33368 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:17:40.925214 sshd[13175]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:17:40.928067 systemd-logind[1465]: New session 109 of user core. Feb 9 10:17:40.928568 systemd[1]: Started session-109.scope. Feb 9 10:17:41.007111 sshd[13175]: pam_unix(sshd:session): session closed for user core Feb 9 10:17:41.008543 systemd[1]: sshd@112-139.178.90.113:22-147.75.109.163:33368.service: Deactivated successfully. Feb 9 10:17:41.009043 systemd[1]: session-109.scope: Deactivated successfully. Feb 9 10:17:41.009387 systemd-logind[1465]: Session 109 logged out. Waiting for processes to exit. Feb 9 10:17:41.009871 systemd-logind[1465]: Removed session 109. Feb 9 10:17:40.924000 audit[13175]: CRED_ACQ pid=13175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:41.105888 kernel: audit: type=1101 audit(1707473860.923:2636): pid=13175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:41.105924 kernel: audit: type=1103 audit(1707473860.924:2637): pid=13175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:41.105941 kernel: audit: type=1006 audit(1707473860.924:2638): pid=13175 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=109 res=1 Feb 9 10:17:41.164588 kernel: audit: type=1300 audit(1707473860.924:2638): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe90a89c20 a2=3 a3=0 items=0 ppid=1 pid=13175 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=109 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:40.924000 audit[13175]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe90a89c20 a2=3 a3=0 items=0 ppid=1 pid=13175 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=109 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:41.256690 kernel: audit: type=1327 audit(1707473860.924:2638): proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:40.924000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:41.287153 kernel: audit: type=1105 audit(1707473860.930:2639): pid=13175 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:40.930000 audit[13175]: USER_START pid=13175 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:41.381685 kernel: audit: type=1103 audit(1707473860.931:2640): pid=13177 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:40.931000 audit[13177]: CRED_ACQ pid=13177 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:41.470962 kernel: audit: type=1106 audit(1707473861.007:2641): pid=13175 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:41.007000 audit[13175]: USER_END pid=13175 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:41.566565 kernel: audit: type=1104 audit(1707473861.007:2642): pid=13175 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:41.007000 audit[13175]: CRED_DISP pid=13175 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:41.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.113:22-147.75.109.163:33368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:42.812000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:17:42.812000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001787860 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:17:42.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:17:42.812000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:17:42.812000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001787880 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:17:42.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:17:42.812000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:17:42.812000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0028743e0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:17:42.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:17:42.812000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:17:42.812000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002adfca0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:17:42.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:17:46.017100 systemd[1]: Started sshd@113-139.178.90.113:22-147.75.109.163:60792.service. Feb 9 10:17:46.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.113:22-147.75.109.163:60792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:46.044031 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:17:46.044174 kernel: audit: type=1130 audit(1707473866.016:2648): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.113:22-147.75.109.163:60792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:46.166000 audit[13247]: USER_ACCT pid=13247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:46.167303 sshd[13247]: Accepted publickey for core from 147.75.109.163 port 60792 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:17:46.171879 sshd[13247]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:17:46.181523 systemd-logind[1465]: New session 110 of user core. Feb 9 10:17:46.183874 systemd[1]: Started session-110.scope. Feb 9 10:17:46.170000 audit[13247]: CRED_ACQ pid=13247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:46.351111 kernel: audit: type=1101 audit(1707473866.166:2649): pid=13247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:46.351156 kernel: audit: type=1103 audit(1707473866.170:2650): pid=13247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:46.351176 kernel: audit: type=1006 audit(1707473866.170:2651): pid=13247 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=110 res=1 Feb 9 10:17:46.409853 kernel: audit: type=1300 audit(1707473866.170:2651): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2201e960 a2=3 a3=0 items=0 ppid=1 pid=13247 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=110 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:46.170000 audit[13247]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2201e960 a2=3 a3=0 items=0 ppid=1 pid=13247 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=110 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:46.170000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:46.502299 sshd[13247]: pam_unix(sshd:session): session closed for user core Feb 9 10:17:46.503788 systemd[1]: sshd@113-139.178.90.113:22-147.75.109.163:60792.service: Deactivated successfully. Feb 9 10:17:46.504219 systemd[1]: session-110.scope: Deactivated successfully. Feb 9 10:17:46.504483 systemd-logind[1465]: Session 110 logged out. Waiting for processes to exit. Feb 9 10:17:46.505105 systemd-logind[1465]: Removed session 110. Feb 9 10:17:46.532583 kernel: audit: type=1327 audit(1707473866.170:2651): proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:46.532620 kernel: audit: type=1105 audit(1707473866.195:2652): pid=13247 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:46.195000 audit[13247]: USER_START pid=13247 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:46.627176 kernel: audit: type=1103 audit(1707473866.197:2653): pid=13249 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:46.197000 audit[13249]: CRED_ACQ pid=13249 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:46.716499 kernel: audit: type=1106 audit(1707473866.502:2654): pid=13247 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:46.502000 audit[13247]: USER_END pid=13247 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:46.502000 audit[13247]: CRED_DISP pid=13247 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:46.902273 kernel: audit: type=1104 audit(1707473866.502:2655): pid=13247 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:46.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.113:22-147.75.109.163:60792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:48.072000 audit[6155]: AVC avc: denied { watch } for pid=6155 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.11237457/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c275 tclass=file permissive=0 Feb 9 10:17:48.072000 audit[6155]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c7d660 a2=fc6 a3=0 items=0 ppid=5526 pid=6155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c275 key=(null) Feb 9 10:17:48.072000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:17:48.139000 audit[6126]: AVC avc: denied { watch } for pid=6126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_22.2371031/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c995 tclass=file permissive=0 Feb 9 10:17:48.139000 audit[6126]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001c1adc0 a2=fc6 a3=0 items=0 ppid=5574 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c995 key=(null) Feb 9 10:17:48.139000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:17:51.453960 systemd[1]: Started sshd@114-139.178.90.113:22-147.75.109.163:60806.service. Feb 9 10:17:51.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.113:22-147.75.109.163:60806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:51.481851 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:17:51.481942 kernel: audit: type=1130 audit(1707473871.453:2659): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.113:22-147.75.109.163:60806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:51.604000 audit[13272]: USER_ACCT pid=13272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:51.605594 sshd[13272]: Accepted publickey for core from 147.75.109.163 port 60806 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:17:51.609192 sshd[13272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:17:51.618689 systemd-logind[1465]: New session 111 of user core. Feb 9 10:17:51.621019 systemd[1]: Started session-111.scope. Feb 9 10:17:51.607000 audit[13272]: CRED_ACQ pid=13272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:51.710317 sshd[13272]: pam_unix(sshd:session): session closed for user core Feb 9 10:17:51.711960 systemd[1]: sshd@114-139.178.90.113:22-147.75.109.163:60806.service: Deactivated successfully. Feb 9 10:17:51.712687 systemd[1]: session-111.scope: Deactivated successfully. Feb 9 10:17:51.713198 systemd-logind[1465]: Session 111 logged out. Waiting for processes to exit. Feb 9 10:17:51.713755 systemd-logind[1465]: Removed session 111. Feb 9 10:17:51.790192 kernel: audit: type=1101 audit(1707473871.604:2660): pid=13272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:51.790230 kernel: audit: type=1103 audit(1707473871.607:2661): pid=13272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:51.790250 kernel: audit: type=1006 audit(1707473871.607:2662): pid=13272 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=111 res=1 Feb 9 10:17:51.848955 kernel: audit: type=1300 audit(1707473871.607:2662): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc4d212a0 a2=3 a3=0 items=0 ppid=1 pid=13272 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=111 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:51.607000 audit[13272]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc4d212a0 a2=3 a3=0 items=0 ppid=1 pid=13272 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=111 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:51.941046 kernel: audit: type=1327 audit(1707473871.607:2662): proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:51.607000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:51.971498 kernel: audit: type=1105 audit(1707473871.632:2663): pid=13272 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:51.632000 audit[13272]: USER_START pid=13272 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:52.066105 kernel: audit: type=1103 audit(1707473871.633:2664): pid=13274 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:51.633000 audit[13274]: CRED_ACQ pid=13274 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:52.155398 kernel: audit: type=1106 audit(1707473871.710:2665): pid=13272 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:51.710000 audit[13272]: USER_END pid=13272 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:52.251055 kernel: audit: type=1104 audit(1707473871.710:2666): pid=13272 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:51.710000 audit[13272]: CRED_DISP pid=13272 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:51.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.113:22-147.75.109.163:60806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:56.721856 systemd[1]: Started sshd@115-139.178.90.113:22-147.75.109.163:32886.service. Feb 9 10:17:56.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.113:22-147.75.109.163:32886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:56.749452 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:17:56.749495 kernel: audit: type=1130 audit(1707473876.721:2668): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.113:22-147.75.109.163:32886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:17:56.871000 audit[13335]: USER_ACCT pid=13335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:56.871961 sshd[13335]: Accepted publickey for core from 147.75.109.163 port 32886 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:17:56.873971 sshd[13335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:17:56.876802 systemd-logind[1465]: New session 112 of user core. Feb 9 10:17:56.877832 systemd[1]: Started session-112.scope. Feb 9 10:17:56.956136 sshd[13335]: pam_unix(sshd:session): session closed for user core Feb 9 10:17:56.957542 systemd[1]: sshd@115-139.178.90.113:22-147.75.109.163:32886.service: Deactivated successfully. Feb 9 10:17:56.957986 systemd[1]: session-112.scope: Deactivated successfully. Feb 9 10:17:56.958321 systemd-logind[1465]: Session 112 logged out. Waiting for processes to exit. Feb 9 10:17:56.958790 systemd-logind[1465]: Removed session 112. Feb 9 10:17:56.873000 audit[13335]: CRED_ACQ pid=13335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:57.053790 kernel: audit: type=1101 audit(1707473876.871:2669): pid=13335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:57.053832 kernel: audit: type=1103 audit(1707473876.873:2670): pid=13335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:57.053852 kernel: audit: type=1006 audit(1707473876.873:2671): pid=13335 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=112 res=1 Feb 9 10:17:57.112534 kernel: audit: type=1300 audit(1707473876.873:2671): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe26602030 a2=3 a3=0 items=0 ppid=1 pid=13335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=112 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:56.873000 audit[13335]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe26602030 a2=3 a3=0 items=0 ppid=1 pid=13335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=112 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:17:57.204634 kernel: audit: type=1327 audit(1707473876.873:2671): proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:56.873000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:17:57.235251 kernel: audit: type=1105 audit(1707473876.880:2672): pid=13335 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:56.880000 audit[13335]: USER_START pid=13335 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:57.329787 kernel: audit: type=1103 audit(1707473876.880:2673): pid=13337 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:56.880000 audit[13337]: CRED_ACQ pid=13337 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:57.419074 kernel: audit: type=1106 audit(1707473876.956:2674): pid=13335 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:56.956000 audit[13335]: USER_END pid=13335 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:57.514845 kernel: audit: type=1104 audit(1707473876.956:2675): pid=13335 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:56.956000 audit[13335]: CRED_DISP pid=13335 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:17:56.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.113:22-147.75.109.163:32886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:01.967953 systemd[1]: Started sshd@116-139.178.90.113:22-147.75.109.163:32894.service. Feb 9 10:18:01.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.113:22-147.75.109.163:32894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:01.995489 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:18:01.995530 kernel: audit: type=1130 audit(1707473881.967:2677): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.113:22-147.75.109.163:32894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:02.117000 audit[13363]: USER_ACCT pid=13363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:02.117852 sshd[13363]: Accepted publickey for core from 147.75.109.163 port 32894 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:18:02.119860 sshd[13363]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:18:02.122209 systemd-logind[1465]: New session 113 of user core. Feb 9 10:18:02.122737 systemd[1]: Started session-113.scope. Feb 9 10:18:02.201284 sshd[13363]: pam_unix(sshd:session): session closed for user core Feb 9 10:18:02.202659 systemd[1]: sshd@116-139.178.90.113:22-147.75.109.163:32894.service: Deactivated successfully. Feb 9 10:18:02.203093 systemd[1]: session-113.scope: Deactivated successfully. Feb 9 10:18:02.203419 systemd-logind[1465]: Session 113 logged out. Waiting for processes to exit. Feb 9 10:18:02.204299 systemd-logind[1465]: Removed session 113. Feb 9 10:18:02.119000 audit[13363]: CRED_ACQ pid=13363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:02.299784 kernel: audit: type=1101 audit(1707473882.117:2678): pid=13363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:02.299822 kernel: audit: type=1103 audit(1707473882.119:2679): pid=13363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:02.299842 kernel: audit: type=1006 audit(1707473882.119:2680): pid=13363 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=113 res=1 Feb 9 10:18:02.358493 kernel: audit: type=1300 audit(1707473882.119:2680): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdea54a10 a2=3 a3=0 items=0 ppid=1 pid=13363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=113 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:02.119000 audit[13363]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdea54a10 a2=3 a3=0 items=0 ppid=1 pid=13363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=113 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:02.450641 kernel: audit: type=1327 audit(1707473882.119:2680): proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:02.119000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:02.481088 kernel: audit: type=1105 audit(1707473882.124:2681): pid=13363 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:02.124000 audit[13363]: USER_START pid=13363 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:02.575622 kernel: audit: type=1103 audit(1707473882.125:2682): pid=13365 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:02.125000 audit[13365]: CRED_ACQ pid=13365 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:02.664934 kernel: audit: type=1106 audit(1707473882.201:2683): pid=13363 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:02.201000 audit[13363]: USER_END pid=13363 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:02.760482 kernel: audit: type=1104 audit(1707473882.201:2684): pid=13363 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:02.201000 audit[13363]: CRED_DISP pid=13363 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:02.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.113:22-147.75.109.163:32894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:07.213604 systemd[1]: Started sshd@117-139.178.90.113:22-147.75.109.163:55532.service. Feb 9 10:18:07.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.113:22-147.75.109.163:55532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:07.240991 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:18:07.241056 kernel: audit: type=1130 audit(1707473887.213:2686): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.113:22-147.75.109.163:55532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:07.362000 audit[13389]: USER_ACCT pid=13389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:07.363527 sshd[13389]: Accepted publickey for core from 147.75.109.163 port 55532 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:18:07.364720 sshd[13389]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:18:07.367224 systemd-logind[1465]: New session 114 of user core. Feb 9 10:18:07.367714 systemd[1]: Started session-114.scope. Feb 9 10:18:07.446385 sshd[13389]: pam_unix(sshd:session): session closed for user core Feb 9 10:18:07.447907 systemd[1]: sshd@117-139.178.90.113:22-147.75.109.163:55532.service: Deactivated successfully. Feb 9 10:18:07.448490 systemd[1]: session-114.scope: Deactivated successfully. Feb 9 10:18:07.448929 systemd-logind[1465]: Session 114 logged out. Waiting for processes to exit. Feb 9 10:18:07.449642 systemd-logind[1465]: Removed session 114. Feb 9 10:18:07.363000 audit[13389]: CRED_ACQ pid=13389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:07.457643 kernel: audit: type=1101 audit(1707473887.362:2687): pid=13389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:07.457704 kernel: audit: type=1103 audit(1707473887.363:2688): pid=13389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:07.606316 kernel: audit: type=1006 audit(1707473887.363:2689): pid=13389 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=114 res=1 Feb 9 10:18:07.606399 kernel: audit: type=1300 audit(1707473887.363:2689): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0c5cd7b0 a2=3 a3=0 items=0 ppid=1 pid=13389 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=114 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:07.363000 audit[13389]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0c5cd7b0 a2=3 a3=0 items=0 ppid=1 pid=13389 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=114 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:07.363000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:07.728844 kernel: audit: type=1327 audit(1707473887.363:2689): proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:07.728909 kernel: audit: type=1105 audit(1707473887.369:2690): pid=13389 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:07.369000 audit[13389]: USER_START pid=13389 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:07.370000 audit[13391]: CRED_ACQ pid=13391 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:07.912641 kernel: audit: type=1103 audit(1707473887.370:2691): pid=13391 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:07.912701 kernel: audit: type=1106 audit(1707473887.446:2692): pid=13389 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:07.446000 audit[13389]: USER_END pid=13389 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:07.446000 audit[13389]: CRED_DISP pid=13389 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:08.097586 kernel: audit: type=1104 audit(1707473887.446:2693): pid=13389 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:07.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.113:22-147.75.109.163:55532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:12.450021 systemd[1]: Started sshd@118-139.178.90.113:22-147.75.109.163:55542.service. Feb 9 10:18:12.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.113:22-147.75.109.163:55542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:12.477044 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:18:12.477189 kernel: audit: type=1130 audit(1707473892.449:2695): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.113:22-147.75.109.163:55542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:12.599965 sshd[13433]: Accepted publickey for core from 147.75.109.163 port 55542 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:18:12.599000 audit[13433]: USER_ACCT pid=13433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:12.600847 sshd[13433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:18:12.603271 systemd-logind[1465]: New session 115 of user core. Feb 9 10:18:12.603685 systemd[1]: Started session-115.scope. Feb 9 10:18:12.680738 sshd[13433]: pam_unix(sshd:session): session closed for user core Feb 9 10:18:12.682194 systemd[1]: sshd@118-139.178.90.113:22-147.75.109.163:55542.service: Deactivated successfully. Feb 9 10:18:12.682635 systemd[1]: session-115.scope: Deactivated successfully. Feb 9 10:18:12.683011 systemd-logind[1465]: Session 115 logged out. Waiting for processes to exit. Feb 9 10:18:12.683515 systemd-logind[1465]: Removed session 115. Feb 9 10:18:12.600000 audit[13433]: CRED_ACQ pid=13433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:12.781828 kernel: audit: type=1101 audit(1707473892.599:2696): pid=13433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:12.781907 kernel: audit: type=1103 audit(1707473892.600:2697): pid=13433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:12.781948 kernel: audit: type=1006 audit(1707473892.600:2698): pid=13433 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=115 res=1 Feb 9 10:18:12.600000 audit[13433]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3fac7720 a2=3 a3=0 items=0 ppid=1 pid=13433 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=115 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:12.932561 kernel: audit: type=1300 audit(1707473892.600:2698): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3fac7720 a2=3 a3=0 items=0 ppid=1 pid=13433 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=115 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:12.932610 kernel: audit: type=1327 audit(1707473892.600:2698): proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:12.600000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:12.605000 audit[13433]: USER_START pid=13433 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:13.057468 kernel: audit: type=1105 audit(1707473892.605:2699): pid=13433 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:13.057519 kernel: audit: type=1103 audit(1707473892.605:2700): pid=13435 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:12.605000 audit[13435]: CRED_ACQ pid=13435 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:13.146720 kernel: audit: type=1106 audit(1707473892.680:2701): pid=13433 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:12.680000 audit[13433]: USER_END pid=13433 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:12.680000 audit[13433]: CRED_DISP pid=13433 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:13.331505 kernel: audit: type=1104 audit(1707473892.680:2702): pid=13433 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:12.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.113:22-147.75.109.163:55542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:17.690059 systemd[1]: Started sshd@119-139.178.90.113:22-147.75.109.163:60694.service. Feb 9 10:18:17.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.113:22-147.75.109.163:60694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:17.716836 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:18:17.716960 kernel: audit: type=1130 audit(1707473897.689:2704): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.113:22-147.75.109.163:60694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:17.839948 sshd[13486]: Accepted publickey for core from 147.75.109.163 port 60694 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:18:17.839000 audit[13486]: USER_ACCT pid=13486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:17.841247 sshd[13486]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:18:17.843538 systemd-logind[1465]: New session 116 of user core. Feb 9 10:18:17.844125 systemd[1]: Started session-116.scope. Feb 9 10:18:17.922406 sshd[13486]: pam_unix(sshd:session): session closed for user core Feb 9 10:18:17.923691 systemd[1]: sshd@119-139.178.90.113:22-147.75.109.163:60694.service: Deactivated successfully. Feb 9 10:18:17.924128 systemd[1]: session-116.scope: Deactivated successfully. Feb 9 10:18:17.924428 systemd-logind[1465]: Session 116 logged out. Waiting for processes to exit. Feb 9 10:18:17.924905 systemd-logind[1465]: Removed session 116. Feb 9 10:18:17.840000 audit[13486]: CRED_ACQ pid=13486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:18.021758 kernel: audit: type=1101 audit(1707473897.839:2705): pid=13486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:18.021818 kernel: audit: type=1103 audit(1707473897.840:2706): pid=13486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:18.021868 kernel: audit: type=1006 audit(1707473897.840:2707): pid=13486 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=116 res=1 Feb 9 10:18:17.840000 audit[13486]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca55fbf00 a2=3 a3=0 items=0 ppid=1 pid=13486 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=116 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:18.080633 kernel: audit: type=1300 audit(1707473897.840:2707): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca55fbf00 a2=3 a3=0 items=0 ppid=1 pid=13486 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=116 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:18.172596 kernel: audit: type=1327 audit(1707473897.840:2707): proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:17.840000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:17.845000 audit[13486]: USER_START pid=13486 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:18.297690 kernel: audit: type=1105 audit(1707473897.845:2708): pid=13486 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:18.297723 kernel: audit: type=1103 audit(1707473897.846:2709): pid=13490 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:17.846000 audit[13490]: CRED_ACQ pid=13490 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:18.386937 kernel: audit: type=1106 audit(1707473897.922:2710): pid=13486 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:17.922000 audit[13486]: USER_END pid=13486 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:18.482498 kernel: audit: type=1104 audit(1707473897.922:2711): pid=13486 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:17.922000 audit[13486]: CRED_DISP pid=13486 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:17.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.113:22-147.75.109.163:60694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:22.932137 systemd[1]: Started sshd@120-139.178.90.113:22-147.75.109.163:60696.service. Feb 9 10:18:22.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.113:22-147.75.109.163:60696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:22.959191 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:18:22.959238 kernel: audit: type=1130 audit(1707473902.931:2713): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.113:22-147.75.109.163:60696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:23.081000 audit[13559]: USER_ACCT pid=13559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:23.082452 sshd[13559]: Accepted publickey for core from 147.75.109.163 port 60696 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:18:23.083718 sshd[13559]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:18:23.086194 systemd-logind[1465]: New session 117 of user core. Feb 9 10:18:23.086668 systemd[1]: Started session-117.scope. Feb 9 10:18:23.165856 sshd[13559]: pam_unix(sshd:session): session closed for user core Feb 9 10:18:23.167308 systemd[1]: sshd@120-139.178.90.113:22-147.75.109.163:60696.service: Deactivated successfully. Feb 9 10:18:23.167741 systemd[1]: session-117.scope: Deactivated successfully. Feb 9 10:18:23.168117 systemd-logind[1465]: Session 117 logged out. Waiting for processes to exit. Feb 9 10:18:23.168524 systemd-logind[1465]: Removed session 117. Feb 9 10:18:23.082000 audit[13559]: CRED_ACQ pid=13559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:23.266207 kernel: audit: type=1101 audit(1707473903.081:2714): pid=13559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:23.266247 kernel: audit: type=1103 audit(1707473903.082:2715): pid=13559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:23.266270 kernel: audit: type=1006 audit(1707473903.083:2716): pid=13559 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=117 res=1 Feb 9 10:18:23.325009 kernel: audit: type=1300 audit(1707473903.083:2716): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcc2ec480 a2=3 a3=0 items=0 ppid=1 pid=13559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=117 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:23.083000 audit[13559]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcc2ec480 a2=3 a3=0 items=0 ppid=1 pid=13559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=117 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:23.417203 kernel: audit: type=1327 audit(1707473903.083:2716): proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:23.083000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:23.447692 kernel: audit: type=1105 audit(1707473903.088:2717): pid=13559 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:23.088000 audit[13559]: USER_START pid=13559 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:23.542316 kernel: audit: type=1103 audit(1707473903.088:2718): pid=13561 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:23.088000 audit[13561]: CRED_ACQ pid=13561 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:23.631640 kernel: audit: type=1106 audit(1707473903.166:2719): pid=13559 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:23.166000 audit[13559]: USER_END pid=13559 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:23.727244 kernel: audit: type=1104 audit(1707473903.166:2720): pid=13559 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:23.166000 audit[13559]: CRED_DISP pid=13559 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:23.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.113:22-147.75.109.163:60696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:27.853070 systemd[1]: Started sshd@121-139.178.90.113:22-218.92.0.52:8204.service. Feb 9 10:18:27.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.90.113:22-218.92.0.52:8204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:28.175047 systemd[1]: Started sshd@122-139.178.90.113:22-147.75.109.163:51998.service. Feb 9 10:18:28.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.113:22-147.75.109.163:51998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:28.201393 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 10:18:28.201441 kernel: audit: type=1130 audit(1707473908.174:2723): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.113:22-147.75.109.163:51998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:28.323000 audit[13588]: USER_ACCT pid=13588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:28.324020 sshd[13588]: Accepted publickey for core from 147.75.109.163 port 51998 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:18:28.324677 sshd[13588]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:18:28.326806 systemd-logind[1465]: New session 118 of user core. Feb 9 10:18:28.327277 systemd[1]: Started session-118.scope. Feb 9 10:18:28.404738 sshd[13588]: pam_unix(sshd:session): session closed for user core Feb 9 10:18:28.406136 systemd[1]: sshd@122-139.178.90.113:22-147.75.109.163:51998.service: Deactivated successfully. Feb 9 10:18:28.406579 systemd[1]: session-118.scope: Deactivated successfully. Feb 9 10:18:28.406972 systemd-logind[1465]: Session 118 logged out. Waiting for processes to exit. Feb 9 10:18:28.407424 systemd-logind[1465]: Removed session 118. Feb 9 10:18:28.323000 audit[13588]: CRED_ACQ pid=13588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:28.505978 kernel: audit: type=1101 audit(1707473908.323:2724): pid=13588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:28.506019 kernel: audit: type=1103 audit(1707473908.323:2725): pid=13588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:28.506035 kernel: audit: type=1006 audit(1707473908.323:2726): pid=13588 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=118 res=1 Feb 9 10:18:28.564722 kernel: audit: type=1300 audit(1707473908.323:2726): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc662161d0 a2=3 a3=0 items=0 ppid=1 pid=13588 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=118 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:28.323000 audit[13588]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc662161d0 a2=3 a3=0 items=0 ppid=1 pid=13588 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=118 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:28.656868 kernel: audit: type=1327 audit(1707473908.323:2726): proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:28.323000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:28.687336 kernel: audit: type=1105 audit(1707473908.328:2727): pid=13588 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:28.328000 audit[13588]: USER_START pid=13588 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:28.329000 audit[13590]: CRED_ACQ pid=13590 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:28.871325 kernel: audit: type=1103 audit(1707473908.329:2728): pid=13590 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:28.871360 kernel: audit: type=1106 audit(1707473908.404:2729): pid=13588 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:28.404000 audit[13588]: USER_END pid=13588 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:28.966918 kernel: audit: type=1104 audit(1707473908.404:2730): pid=13588 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:28.404000 audit[13588]: CRED_DISP pid=13588 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:28.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.113:22-147.75.109.163:51998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:33.417865 systemd[1]: Started sshd@123-139.178.90.113:22-147.75.109.163:52000.service. Feb 9 10:18:33.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.113:22-147.75.109.163:52000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:33.455466 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:18:33.455595 kernel: audit: type=1130 audit(1707473913.418:2732): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.113:22-147.75.109.163:52000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:33.490203 sshd[13613]: Accepted publickey for core from 147.75.109.163 port 52000 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:18:33.491458 sshd[13613]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:18:33.493738 systemd-logind[1465]: New session 119 of user core. Feb 9 10:18:33.494342 systemd[1]: Started session-119.scope. Feb 9 10:18:33.489000 audit[13613]: USER_ACCT pid=13613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:33.571380 sshd[13613]: pam_unix(sshd:session): session closed for user core Feb 9 10:18:33.572700 systemd[1]: sshd@123-139.178.90.113:22-147.75.109.163:52000.service: Deactivated successfully. Feb 9 10:18:33.573136 systemd[1]: session-119.scope: Deactivated successfully. Feb 9 10:18:33.573528 systemd-logind[1465]: Session 119 logged out. Waiting for processes to exit. Feb 9 10:18:33.574062 systemd-logind[1465]: Removed session 119. Feb 9 10:18:33.634959 kernel: audit: type=1101 audit(1707473913.489:2733): pid=13613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:33.635024 kernel: audit: type=1103 audit(1707473913.490:2734): pid=13613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:33.490000 audit[13613]: CRED_ACQ pid=13613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:33.725618 kernel: audit: type=1006 audit(1707473913.490:2735): pid=13613 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=119 res=1 Feb 9 10:18:33.784345 kernel: audit: type=1300 audit(1707473913.490:2735): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe57ad7060 a2=3 a3=0 items=0 ppid=1 pid=13613 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=119 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:33.490000 audit[13613]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe57ad7060 a2=3 a3=0 items=0 ppid=1 pid=13613 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=119 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:33.490000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:33.906932 kernel: audit: type=1327 audit(1707473913.490:2735): proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:33.906964 kernel: audit: type=1105 audit(1707473913.496:2736): pid=13613 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:33.496000 audit[13613]: USER_START pid=13613 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:34.001517 kernel: audit: type=1103 audit(1707473913.496:2737): pid=13615 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:33.496000 audit[13615]: CRED_ACQ pid=13615 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:34.090942 kernel: audit: type=1106 audit(1707473913.571:2738): pid=13613 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:33.571000 audit[13613]: USER_END pid=13613 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:34.186548 kernel: audit: type=1104 audit(1707473913.571:2739): pid=13613 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:33.571000 audit[13613]: CRED_DISP pid=13613 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:33.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.113:22-147.75.109.163:52000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:38.580941 systemd[1]: Started sshd@124-139.178.90.113:22-147.75.109.163:42370.service. Feb 9 10:18:38.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.113:22-147.75.109.163:42370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:38.608250 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:18:38.608353 kernel: audit: type=1130 audit(1707473918.580:2741): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.113:22-147.75.109.163:42370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:38.729000 audit[13658]: USER_ACCT pid=13658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:38.729963 sshd[13658]: Accepted publickey for core from 147.75.109.163 port 42370 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:18:38.731861 sshd[13658]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:18:38.734169 systemd-logind[1465]: New session 120 of user core. Feb 9 10:18:38.734711 systemd[1]: Started session-120.scope. Feb 9 10:18:38.813290 sshd[13658]: pam_unix(sshd:session): session closed for user core Feb 9 10:18:38.814537 systemd[1]: sshd@124-139.178.90.113:22-147.75.109.163:42370.service: Deactivated successfully. Feb 9 10:18:38.814981 systemd[1]: session-120.scope: Deactivated successfully. Feb 9 10:18:38.815332 systemd-logind[1465]: Session 120 logged out. Waiting for processes to exit. Feb 9 10:18:38.815839 systemd-logind[1465]: Removed session 120. Feb 9 10:18:38.731000 audit[13658]: CRED_ACQ pid=13658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:38.911831 kernel: audit: type=1101 audit(1707473918.729:2742): pid=13658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:38.911876 kernel: audit: type=1103 audit(1707473918.731:2743): pid=13658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:38.911895 kernel: audit: type=1006 audit(1707473918.731:2744): pid=13658 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=120 res=1 Feb 9 10:18:38.731000 audit[13658]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd76a98b10 a2=3 a3=0 items=0 ppid=1 pid=13658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=120 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:39.062690 kernel: audit: type=1300 audit(1707473918.731:2744): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd76a98b10 a2=3 a3=0 items=0 ppid=1 pid=13658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=120 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:39.062726 kernel: audit: type=1327 audit(1707473918.731:2744): proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:38.731000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:39.093161 kernel: audit: type=1105 audit(1707473918.736:2745): pid=13658 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:38.736000 audit[13658]: USER_START pid=13658 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:39.187716 kernel: audit: type=1103 audit(1707473918.737:2746): pid=13660 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:38.737000 audit[13660]: CRED_ACQ pid=13660 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:39.277033 kernel: audit: type=1400 audit(1707473918.766:2747): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:18:38.766000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:18:39.367713 kernel: audit: type=1300 audit(1707473918.766:2747): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001076360 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:18:38.766000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001076360 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:18:38.766000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:18:38.767000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:18:38.767000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026872c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:18:38.767000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:18:38.813000 audit[13658]: USER_END pid=13658 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:38.813000 audit[13658]: CRED_DISP pid=13658 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:38.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.113:22-147.75.109.163:42370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:38.819000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:18:38.819000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:18:38.819000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0067d7cb0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:18:38.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:18:38.819000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0114c8f30 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:18:38.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:18:38.819000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:18:38.819000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0067d7d10 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:18:38.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:18:38.819000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:18:38.819000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c002f95b80 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:18:38.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:18:38.821000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:18:38.821000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002ee20e0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:18:38.821000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:18:38.834000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:18:38.834000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00b5841b0 a2=fc6 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c663,c798 key=(null) Feb 9 10:18:38.834000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 10:18:42.812000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:18:42.812000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000eaf9a0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:18:42.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:18:42.812000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:18:42.812000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d8bb60 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:18:42.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:18:42.812000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:18:42.812000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:18:42.812000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000eaf9c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:18:42.812000 audit[2434]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000d8bb80 a2=fc6 a3=0 items=0 ppid=2255 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c498 key=(null) Feb 9 10:18:42.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:18:42.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:18:43.823155 systemd[1]: Started sshd@125-139.178.90.113:22-147.75.109.163:42376.service. Feb 9 10:18:43.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.113:22-147.75.109.163:42376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:43.850158 kernel: kauditd_printk_skb: 37 callbacks suppressed Feb 9 10:18:43.850210 kernel: audit: type=1130 audit(1707473923.822:2762): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.113:22-147.75.109.163:42376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:18:43.972000 audit[13732]: USER_ACCT pid=13732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:43.973009 sshd[13732]: Accepted publickey for core from 147.75.109.163 port 42376 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:18:43.974177 sshd[13732]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:18:43.976738 systemd-logind[1465]: New session 121 of user core. Feb 9 10:18:43.977237 systemd[1]: Started session-121.scope. Feb 9 10:18:44.055704 sshd[13732]: pam_unix(sshd:session): session closed for user core Feb 9 10:18:44.057208 systemd[1]: sshd@125-139.178.90.113:22-147.75.109.163:42376.service: Deactivated successfully. Feb 9 10:18:44.057680 systemd[1]: session-121.scope: Deactivated successfully. Feb 9 10:18:44.058108 systemd-logind[1465]: Session 121 logged out. Waiting for processes to exit. Feb 9 10:18:44.058508 systemd-logind[1465]: Removed session 121. Feb 9 10:18:43.973000 audit[13732]: CRED_ACQ pid=13732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:44.157213 kernel: audit: type=1101 audit(1707473923.972:2763): pid=13732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:44.157261 kernel: audit: type=1103 audit(1707473923.973:2764): pid=13732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:44.157280 kernel: audit: type=1006 audit(1707473923.973:2765): pid=13732 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=121 res=1 Feb 9 10:18:44.215913 kernel: audit: type=1300 audit(1707473923.973:2765): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd273e30e0 a2=3 a3=0 items=0 ppid=1 pid=13732 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=121 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:43.973000 audit[13732]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd273e30e0 a2=3 a3=0 items=0 ppid=1 pid=13732 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=121 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:18:44.307954 kernel: audit: type=1327 audit(1707473923.973:2765): proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:43.973000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:18:44.338406 kernel: audit: type=1105 audit(1707473923.978:2766): pid=13732 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:43.978000 audit[13732]: USER_START pid=13732 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:44.433267 kernel: audit: type=1103 audit(1707473923.979:2767): pid=13734 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:43.979000 audit[13734]: CRED_ACQ pid=13734 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:44.522517 kernel: audit: type=1106 audit(1707473924.055:2768): pid=13732 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:44.055000 audit[13732]: USER_END pid=13732 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:44.618023 kernel: audit: type=1104 audit(1707473924.055:2769): pid=13732 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:44.055000 audit[13732]: CRED_DISP pid=13732 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:18:44.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.113:22-147.75.109.163:42376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'