Feb 9 12:44:09.556307 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Feb 9 12:44:09.556319 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 12:44:09.556326 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 12:44:09.556330 kernel: BIOS-provided physical RAM map: Feb 9 12:44:09.556334 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 12:44:09.556338 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 12:44:09.556342 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 12:44:09.556346 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 12:44:09.556350 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 12:44:09.556355 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000062034fff] usable Feb 9 12:44:09.556359 kernel: BIOS-e820: [mem 0x0000000062035000-0x0000000062035fff] ACPI NVS Feb 9 12:44:09.556362 kernel: BIOS-e820: [mem 0x0000000062036000-0x0000000062036fff] reserved Feb 9 12:44:09.556366 kernel: BIOS-e820: [mem 0x0000000062037000-0x000000006c0c4fff] usable Feb 9 12:44:09.556370 kernel: BIOS-e820: [mem 0x000000006c0c5000-0x000000006d1a7fff] reserved Feb 9 12:44:09.556375 kernel: BIOS-e820: [mem 0x000000006d1a8000-0x000000006d330fff] usable Feb 9 12:44:09.556380 kernel: BIOS-e820: [mem 0x000000006d331000-0x000000006d762fff] ACPI NVS Feb 9 12:44:09.556385 kernel: BIOS-e820: [mem 0x000000006d763000-0x000000006fffefff] reserved Feb 9 12:44:09.556392 kernel: BIOS-e820: [mem 0x000000006ffff000-0x000000006fffffff] usable Feb 9 12:44:09.556397 kernel: BIOS-e820: [mem 0x0000000070000000-0x000000007b7fffff] reserved Feb 9 12:44:09.556401 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 12:44:09.556406 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 12:44:09.556423 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 12:44:09.556427 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 12:44:09.556431 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 12:44:09.556435 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000008837fffff] usable Feb 9 12:44:09.556441 kernel: NX (Execute Disable) protection: active Feb 9 12:44:09.556445 kernel: SMBIOS 3.2.1 present. Feb 9 12:44:09.556449 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Feb 9 12:44:09.556453 kernel: tsc: Detected 3400.000 MHz processor Feb 9 12:44:09.556457 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 12:44:09.556462 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 12:44:09.556466 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 12:44:09.556471 kernel: last_pfn = 0x883800 max_arch_pfn = 0x400000000 Feb 9 12:44:09.556475 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 12:44:09.556480 kernel: last_pfn = 0x70000 max_arch_pfn = 0x400000000 Feb 9 12:44:09.556484 kernel: Using GB pages for direct mapping Feb 9 12:44:09.556489 kernel: ACPI: Early table checksum verification disabled Feb 9 12:44:09.556494 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 12:44:09.556498 kernel: ACPI: XSDT 0x000000006D6440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 12:44:09.556502 kernel: ACPI: FACP 0x000000006D680620 000114 (v06 01072009 AMI 00010013) Feb 9 12:44:09.556509 kernel: ACPI: DSDT 0x000000006D644268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 12:44:09.556513 kernel: ACPI: FACS 0x000000006D762F80 000040 Feb 9 12:44:09.556519 kernel: ACPI: APIC 0x000000006D680738 00012C (v04 01072009 AMI 00010013) Feb 9 12:44:09.556523 kernel: ACPI: FPDT 0x000000006D680868 000044 (v01 01072009 AMI 00010013) Feb 9 12:44:09.556528 kernel: ACPI: FIDT 0x000000006D6808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 12:44:09.556533 kernel: ACPI: MCFG 0x000000006D680950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 12:44:09.556538 kernel: ACPI: SPMI 0x000000006D680990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 12:44:09.556542 kernel: ACPI: SSDT 0x000000006D6809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 12:44:09.556547 kernel: ACPI: SSDT 0x000000006D6824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 12:44:09.556552 kernel: ACPI: SSDT 0x000000006D6856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 12:44:09.556557 kernel: ACPI: HPET 0x000000006D6879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:44:09.556562 kernel: ACPI: SSDT 0x000000006D687A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 12:44:09.556567 kernel: ACPI: SSDT 0x000000006D6889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 12:44:09.556571 kernel: ACPI: UEFI 0x000000006D6892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:44:09.556576 kernel: ACPI: LPIT 0x000000006D689318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:44:09.556580 kernel: ACPI: SSDT 0x000000006D6893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 12:44:09.556585 kernel: ACPI: SSDT 0x000000006D68BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 12:44:09.556590 kernel: ACPI: DBGP 0x000000006D68D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:44:09.556595 kernel: ACPI: DBG2 0x000000006D68D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:44:09.556600 kernel: ACPI: SSDT 0x000000006D68D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 12:44:09.556604 kernel: ACPI: DMAR 0x000000006D68EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Feb 9 12:44:09.556609 kernel: ACPI: SSDT 0x000000006D68ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 12:44:09.556614 kernel: ACPI: TPM2 0x000000006D68EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 12:44:09.556618 kernel: ACPI: SSDT 0x000000006D68EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 12:44:09.556623 kernel: ACPI: WSMT 0x000000006D68FC28 000028 (v01 \xfca 01072009 AMI 00010013) Feb 9 12:44:09.556628 kernel: ACPI: EINJ 0x000000006D68FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 12:44:09.556634 kernel: ACPI: ERST 0x000000006D68FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 12:44:09.556638 kernel: ACPI: BERT 0x000000006D68FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 12:44:09.556643 kernel: ACPI: HEST 0x000000006D68FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 12:44:09.556648 kernel: ACPI: SSDT 0x000000006D690260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 12:44:09.556652 kernel: ACPI: Reserving FACP table memory at [mem 0x6d680620-0x6d680733] Feb 9 12:44:09.556657 kernel: ACPI: Reserving DSDT table memory at [mem 0x6d644268-0x6d68061e] Feb 9 12:44:09.556662 kernel: ACPI: Reserving FACS table memory at [mem 0x6d762f80-0x6d762fbf] Feb 9 12:44:09.556666 kernel: ACPI: Reserving APIC table memory at [mem 0x6d680738-0x6d680863] Feb 9 12:44:09.556671 kernel: ACPI: Reserving FPDT table memory at [mem 0x6d680868-0x6d6808ab] Feb 9 12:44:09.556676 kernel: ACPI: Reserving FIDT table memory at [mem 0x6d6808b0-0x6d68094b] Feb 9 12:44:09.556681 kernel: ACPI: Reserving MCFG table memory at [mem 0x6d680950-0x6d68098b] Feb 9 12:44:09.556686 kernel: ACPI: Reserving SPMI table memory at [mem 0x6d680990-0x6d6809d0] Feb 9 12:44:09.556690 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6809d8-0x6d6824f3] Feb 9 12:44:09.556695 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6824f8-0x6d6856bd] Feb 9 12:44:09.556699 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6856c0-0x6d6879ea] Feb 9 12:44:09.556704 kernel: ACPI: Reserving HPET table memory at [mem 0x6d6879f0-0x6d687a27] Feb 9 12:44:09.556709 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d687a28-0x6d6889d5] Feb 9 12:44:09.556713 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6889d8-0x6d6892ce] Feb 9 12:44:09.556719 kernel: ACPI: Reserving UEFI table memory at [mem 0x6d6892d0-0x6d689311] Feb 9 12:44:09.556723 kernel: ACPI: Reserving LPIT table memory at [mem 0x6d689318-0x6d6893ab] Feb 9 12:44:09.556728 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6893b0-0x6d68bb8d] Feb 9 12:44:09.556733 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68bb90-0x6d68d071] Feb 9 12:44:09.556737 kernel: ACPI: Reserving DBGP table memory at [mem 0x6d68d078-0x6d68d0ab] Feb 9 12:44:09.556742 kernel: ACPI: Reserving DBG2 table memory at [mem 0x6d68d0b0-0x6d68d103] Feb 9 12:44:09.556747 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68d108-0x6d68ec6e] Feb 9 12:44:09.556751 kernel: ACPI: Reserving DMAR table memory at [mem 0x6d68ec70-0x6d68ed17] Feb 9 12:44:09.556756 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ed18-0x6d68ee5b] Feb 9 12:44:09.556761 kernel: ACPI: Reserving TPM2 table memory at [mem 0x6d68ee60-0x6d68ee93] Feb 9 12:44:09.556766 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ee98-0x6d68fc26] Feb 9 12:44:09.556770 kernel: ACPI: Reserving WSMT table memory at [mem 0x6d68fc28-0x6d68fc4f] Feb 9 12:44:09.556775 kernel: ACPI: Reserving EINJ table memory at [mem 0x6d68fc50-0x6d68fd7f] Feb 9 12:44:09.556780 kernel: ACPI: Reserving ERST table memory at [mem 0x6d68fd80-0x6d68ffaf] Feb 9 12:44:09.556784 kernel: ACPI: Reserving BERT table memory at [mem 0x6d68ffb0-0x6d68ffdf] Feb 9 12:44:09.556789 kernel: ACPI: Reserving HEST table memory at [mem 0x6d68ffe0-0x6d69025b] Feb 9 12:44:09.556794 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d690260-0x6d6903c1] Feb 9 12:44:09.556798 kernel: No NUMA configuration found Feb 9 12:44:09.556804 kernel: Faking a node at [mem 0x0000000000000000-0x00000008837fffff] Feb 9 12:44:09.556808 kernel: NODE_DATA(0) allocated [mem 0x8837fa000-0x8837fffff] Feb 9 12:44:09.556813 kernel: Zone ranges: Feb 9 12:44:09.556818 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 12:44:09.556822 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 12:44:09.556827 kernel: Normal [mem 0x0000000100000000-0x00000008837fffff] Feb 9 12:44:09.556832 kernel: Movable zone start for each node Feb 9 12:44:09.556836 kernel: Early memory node ranges Feb 9 12:44:09.556841 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 12:44:09.556845 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 12:44:09.556851 kernel: node 0: [mem 0x0000000040400000-0x0000000062034fff] Feb 9 12:44:09.556856 kernel: node 0: [mem 0x0000000062037000-0x000000006c0c4fff] Feb 9 12:44:09.556860 kernel: node 0: [mem 0x000000006d1a8000-0x000000006d330fff] Feb 9 12:44:09.556865 kernel: node 0: [mem 0x000000006ffff000-0x000000006fffffff] Feb 9 12:44:09.556870 kernel: node 0: [mem 0x0000000100000000-0x00000008837fffff] Feb 9 12:44:09.556874 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000008837fffff] Feb 9 12:44:09.556882 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 12:44:09.556888 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 12:44:09.556893 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 12:44:09.556898 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 12:44:09.556904 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Feb 9 12:44:09.556909 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Feb 9 12:44:09.556914 kernel: On node 0, zone Normal: 18432 pages in unavailable ranges Feb 9 12:44:09.556919 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 12:44:09.556924 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 12:44:09.556929 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 12:44:09.556935 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 12:44:09.556940 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 12:44:09.556945 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 12:44:09.556950 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 12:44:09.556955 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 12:44:09.556960 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 12:44:09.556965 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 12:44:09.556970 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 12:44:09.556975 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 12:44:09.556981 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 12:44:09.556986 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 12:44:09.556991 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 12:44:09.556995 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 12:44:09.557000 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 12:44:09.557005 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 12:44:09.557010 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 12:44:09.557015 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 12:44:09.557020 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 12:44:09.557026 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 12:44:09.557031 kernel: TSC deadline timer available Feb 9 12:44:09.557036 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 12:44:09.557041 kernel: [mem 0x7b800000-0xdfffffff] available for PCI devices Feb 9 12:44:09.557046 kernel: Booting paravirtualized kernel on bare hardware Feb 9 12:44:09.557052 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 12:44:09.557057 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 12:44:09.557062 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 12:44:09.557067 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 12:44:09.557073 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 12:44:09.557078 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8190323 Feb 9 12:44:09.557083 kernel: Policy zone: Normal Feb 9 12:44:09.557088 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 12:44:09.557094 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 12:44:09.557098 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 12:44:09.557104 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 12:44:09.557109 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 12:44:09.557115 kernel: Memory: 32555728K/33281940K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 725952K reserved, 0K cma-reserved) Feb 9 12:44:09.557120 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 12:44:09.557125 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 12:44:09.557130 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 12:44:09.557135 kernel: rcu: Hierarchical RCU implementation. Feb 9 12:44:09.557140 kernel: rcu: RCU event tracing is enabled. Feb 9 12:44:09.557145 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 12:44:09.557150 kernel: Rude variant of Tasks RCU enabled. Feb 9 12:44:09.557155 kernel: Tracing variant of Tasks RCU enabled. Feb 9 12:44:09.557161 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 12:44:09.557166 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 12:44:09.557171 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 12:44:09.557176 kernel: random: crng init done Feb 9 12:44:09.557181 kernel: Console: colour dummy device 80x25 Feb 9 12:44:09.557186 kernel: printk: console [tty0] enabled Feb 9 12:44:09.557191 kernel: printk: console [ttyS1] enabled Feb 9 12:44:09.557196 kernel: ACPI: Core revision 20210730 Feb 9 12:44:09.557201 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Feb 9 12:44:09.557206 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 12:44:09.557212 kernel: DMAR: Host address width 39 Feb 9 12:44:09.557217 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Feb 9 12:44:09.557222 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Feb 9 12:44:09.557227 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 12:44:09.557232 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 12:44:09.557237 kernel: DMAR: RMRR base: 0x0000006e011000 end: 0x0000006e25afff Feb 9 12:44:09.557242 kernel: DMAR: RMRR base: 0x00000079000000 end: 0x0000007b7fffff Feb 9 12:44:09.557247 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Feb 9 12:44:09.557252 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 12:44:09.557258 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 12:44:09.557263 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 12:44:09.557268 kernel: x2apic enabled Feb 9 12:44:09.557273 kernel: Switched APIC routing to cluster x2apic. Feb 9 12:44:09.557278 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 12:44:09.557283 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 12:44:09.557288 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 12:44:09.557293 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 12:44:09.557299 kernel: process: using mwait in idle threads Feb 9 12:44:09.557304 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 12:44:09.557309 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 12:44:09.557314 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 12:44:09.557319 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 12:44:09.557325 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 12:44:09.557330 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 12:44:09.557335 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 12:44:09.557340 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 12:44:09.557345 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 12:44:09.557351 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 12:44:09.557356 kernel: TAA: Mitigation: TSX disabled Feb 9 12:44:09.557361 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 12:44:09.557366 kernel: SRBDS: Mitigation: Microcode Feb 9 12:44:09.557371 kernel: GDS: Vulnerable: No microcode Feb 9 12:44:09.557376 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 12:44:09.557381 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 12:44:09.557386 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 12:44:09.557395 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 12:44:09.557400 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 12:44:09.557405 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 12:44:09.557410 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 12:44:09.557415 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 12:44:09.557420 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 12:44:09.557425 kernel: Freeing SMP alternatives memory: 32K Feb 9 12:44:09.557430 kernel: pid_max: default: 32768 minimum: 301 Feb 9 12:44:09.557435 kernel: LSM: Security Framework initializing Feb 9 12:44:09.557441 kernel: SELinux: Initializing. Feb 9 12:44:09.557446 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 12:44:09.557451 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 12:44:09.557456 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 12:44:09.557462 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 12:44:09.557467 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 12:44:09.557472 kernel: ... version: 4 Feb 9 12:44:09.557477 kernel: ... bit width: 48 Feb 9 12:44:09.557482 kernel: ... generic registers: 4 Feb 9 12:44:09.557487 kernel: ... value mask: 0000ffffffffffff Feb 9 12:44:09.557492 kernel: ... max period: 00007fffffffffff Feb 9 12:44:09.557497 kernel: ... fixed-purpose events: 3 Feb 9 12:44:09.557502 kernel: ... event mask: 000000070000000f Feb 9 12:44:09.557507 kernel: signal: max sigframe size: 2032 Feb 9 12:44:09.557512 kernel: rcu: Hierarchical SRCU implementation. Feb 9 12:44:09.557517 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 12:44:09.557522 kernel: smp: Bringing up secondary CPUs ... Feb 9 12:44:09.557527 kernel: x86: Booting SMP configuration: Feb 9 12:44:09.557533 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 12:44:09.557539 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 12:44:09.557544 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 12:44:09.557549 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 12:44:09.557554 kernel: smpboot: Max logical packages: 1 Feb 9 12:44:09.557559 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 12:44:09.557564 kernel: devtmpfs: initialized Feb 9 12:44:09.557569 kernel: x86/mm: Memory block size: 128MB Feb 9 12:44:09.557574 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x62035000-0x62035fff] (4096 bytes) Feb 9 12:44:09.557580 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6d331000-0x6d762fff] (4399104 bytes) Feb 9 12:44:09.557585 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 12:44:09.557590 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 12:44:09.557595 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 12:44:09.557600 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 12:44:09.557605 kernel: audit: initializing netlink subsys (disabled) Feb 9 12:44:09.557610 kernel: audit: type=2000 audit(1707482644.110:1): state=initialized audit_enabled=0 res=1 Feb 9 12:44:09.557615 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 12:44:09.557620 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 12:44:09.557626 kernel: cpuidle: using governor menu Feb 9 12:44:09.557631 kernel: ACPI: bus type PCI registered Feb 9 12:44:09.557636 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 12:44:09.557641 kernel: dca service started, version 1.12.1 Feb 9 12:44:09.557646 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 12:44:09.557651 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 12:44:09.557656 kernel: PCI: Using configuration type 1 for base access Feb 9 12:44:09.557661 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 12:44:09.557666 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 12:44:09.557672 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 12:44:09.557677 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 12:44:09.557682 kernel: ACPI: Added _OSI(Module Device) Feb 9 12:44:09.557687 kernel: ACPI: Added _OSI(Processor Device) Feb 9 12:44:09.557692 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 12:44:09.557697 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 12:44:09.557701 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 12:44:09.557707 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 12:44:09.557712 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 12:44:09.557717 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 12:44:09.557722 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:44:09.557727 kernel: ACPI: SSDT 0xFFFF8A7500215300 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 12:44:09.557733 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 12:44:09.557738 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:44:09.557743 kernel: ACPI: SSDT 0xFFFF8A7501CED000 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 12:44:09.557748 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:44:09.557752 kernel: ACPI: SSDT 0xFFFF8A7501C59800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 12:44:09.557757 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:44:09.557763 kernel: ACPI: SSDT 0xFFFF8A7501C5A800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 12:44:09.557768 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:44:09.557773 kernel: ACPI: SSDT 0xFFFF8A7500149000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 12:44:09.557778 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:44:09.557783 kernel: ACPI: SSDT 0xFFFF8A7501CEBC00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 12:44:09.557788 kernel: ACPI: Interpreter enabled Feb 9 12:44:09.557793 kernel: ACPI: PM: (supports S0 S5) Feb 9 12:44:09.557798 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 12:44:09.557803 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 12:44:09.557809 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 12:44:09.557814 kernel: HEST: Table parsing has been initialized. Feb 9 12:44:09.557819 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 12:44:09.557824 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 12:44:09.557829 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 12:44:09.557834 kernel: ACPI: PM: Power Resource [USBC] Feb 9 12:44:09.557839 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 12:44:09.557844 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 12:44:09.557849 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 12:44:09.557854 kernel: ACPI: PM: Power Resource [WRST] Feb 9 12:44:09.557860 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 9 12:44:09.557865 kernel: ACPI: PM: Power Resource [FN00] Feb 9 12:44:09.557870 kernel: ACPI: PM: Power Resource [FN01] Feb 9 12:44:09.557875 kernel: ACPI: PM: Power Resource [FN02] Feb 9 12:44:09.557880 kernel: ACPI: PM: Power Resource [FN03] Feb 9 12:44:09.557885 kernel: ACPI: PM: Power Resource [FN04] Feb 9 12:44:09.557889 kernel: ACPI: PM: Power Resource [PIN] Feb 9 12:44:09.557894 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 12:44:09.557958 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 12:44:09.558006 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 12:44:09.558047 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 12:44:09.558054 kernel: PCI host bridge to bus 0000:00 Feb 9 12:44:09.558099 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 12:44:09.558136 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 12:44:09.558173 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 12:44:09.558211 kernel: pci_bus 0000:00: root bus resource [mem 0x7b800000-0xdfffffff window] Feb 9 12:44:09.558246 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 12:44:09.558284 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 12:44:09.558333 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 12:44:09.558380 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 12:44:09.558427 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 12:44:09.558475 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Feb 9 12:44:09.558518 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Feb 9 12:44:09.558563 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Feb 9 12:44:09.558605 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x7c000000-0x7cffffff 64bit] Feb 9 12:44:09.558647 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Feb 9 12:44:09.558688 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Feb 9 12:44:09.558738 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 12:44:09.558782 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x7e51f000-0x7e51ffff 64bit] Feb 9 12:44:09.558826 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 12:44:09.558868 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x7e51e000-0x7e51efff 64bit] Feb 9 12:44:09.558913 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 12:44:09.558954 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x7e500000-0x7e50ffff 64bit] Feb 9 12:44:09.558995 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 12:44:09.559041 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 12:44:09.559082 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x7e512000-0x7e513fff 64bit] Feb 9 12:44:09.559123 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x7e51d000-0x7e51dfff 64bit] Feb 9 12:44:09.559166 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 12:44:09.559207 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 12:44:09.559251 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 12:44:09.559294 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 12:44:09.559339 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 12:44:09.559380 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x7e51a000-0x7e51afff 64bit] Feb 9 12:44:09.559429 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 12:44:09.559480 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 12:44:09.559523 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x7e519000-0x7e519fff 64bit] Feb 9 12:44:09.559563 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 12:44:09.559610 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 12:44:09.559651 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x7e518000-0x7e518fff 64bit] Feb 9 12:44:09.559692 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 12:44:09.559736 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 12:44:09.559776 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x7e510000-0x7e511fff] Feb 9 12:44:09.559817 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x7e517000-0x7e5170ff] Feb 9 12:44:09.559861 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Feb 9 12:44:09.559901 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Feb 9 12:44:09.559942 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Feb 9 12:44:09.559983 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x7e516000-0x7e5167ff] Feb 9 12:44:09.560023 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 12:44:09.560067 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 12:44:09.560110 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 12:44:09.560157 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 12:44:09.560200 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 12:44:09.560247 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 12:44:09.560293 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 12:44:09.560337 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 12:44:09.560380 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 12:44:09.560433 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Feb 9 12:44:09.560475 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Feb 9 12:44:09.560520 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 12:44:09.560561 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 12:44:09.560608 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 12:44:09.560652 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 12:44:09.560694 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x7e514000-0x7e5140ff 64bit] Feb 9 12:44:09.560734 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 12:44:09.560779 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 12:44:09.560821 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 12:44:09.560864 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 12:44:09.560913 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 12:44:09.560956 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 12:44:09.560999 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x7e200000-0x7e2fffff pref] Feb 9 12:44:09.561043 kernel: pci 0000:02:00.0: PME# supported from D3cold Feb 9 12:44:09.561086 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 12:44:09.561128 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 12:44:09.561178 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 12:44:09.561221 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 12:44:09.561264 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x7e100000-0x7e1fffff pref] Feb 9 12:44:09.561306 kernel: pci 0000:02:00.1: PME# supported from D3cold Feb 9 12:44:09.561349 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 12:44:09.561394 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 12:44:09.561438 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 12:44:09.561482 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Feb 9 12:44:09.561523 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 12:44:09.561565 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 12:44:09.561611 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 12:44:09.561655 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x7e400000-0x7e47ffff] Feb 9 12:44:09.561697 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 12:44:09.561740 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x7e480000-0x7e483fff] Feb 9 12:44:09.561781 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 12:44:09.561825 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 12:44:09.561865 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 12:44:09.561906 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Feb 9 12:44:09.561984 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Feb 9 12:44:09.562067 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x7e300000-0x7e37ffff] Feb 9 12:44:09.562109 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 12:44:09.562151 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x7e380000-0x7e383fff] Feb 9 12:44:09.562195 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Feb 9 12:44:09.562236 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 12:44:09.562278 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 12:44:09.562319 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Feb 9 12:44:09.562359 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 12:44:09.562411 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 12:44:09.562454 kernel: pci 0000:07:00.0: enabling Extended Tags Feb 9 12:44:09.562497 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 12:44:09.562541 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 12:44:09.562584 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 12:44:09.562625 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 12:44:09.562666 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 12:44:09.562711 kernel: pci_bus 0000:08: extended config space not accessible Feb 9 12:44:09.562763 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 12:44:09.562807 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x7d000000-0x7dffffff] Feb 9 12:44:09.562855 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x7e000000-0x7e01ffff] Feb 9 12:44:09.562899 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 12:44:09.562943 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 12:44:09.562987 kernel: pci 0000:08:00.0: supports D1 D2 Feb 9 12:44:09.563033 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 12:44:09.563075 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 12:44:09.563118 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 12:44:09.563160 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 12:44:09.563169 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 12:44:09.563175 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 12:44:09.563180 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 12:44:09.563186 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 12:44:09.563191 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 12:44:09.563196 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 12:44:09.563202 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 12:44:09.563207 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 12:44:09.563214 kernel: iommu: Default domain type: Translated Feb 9 12:44:09.563219 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 12:44:09.563263 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Feb 9 12:44:09.563307 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 12:44:09.563353 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Feb 9 12:44:09.563361 kernel: vgaarb: loaded Feb 9 12:44:09.563366 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 12:44:09.563372 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 12:44:09.563377 kernel: PTP clock support registered Feb 9 12:44:09.563384 kernel: PCI: Using ACPI for IRQ routing Feb 9 12:44:09.563393 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 12:44:09.563399 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 12:44:09.563405 kernel: e820: reserve RAM buffer [mem 0x62035000-0x63ffffff] Feb 9 12:44:09.563410 kernel: e820: reserve RAM buffer [mem 0x6c0c5000-0x6fffffff] Feb 9 12:44:09.563415 kernel: e820: reserve RAM buffer [mem 0x6d331000-0x6fffffff] Feb 9 12:44:09.563421 kernel: e820: reserve RAM buffer [mem 0x883800000-0x883ffffff] Feb 9 12:44:09.563426 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 9 12:44:09.563431 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Feb 9 12:44:09.563438 kernel: clocksource: Switched to clocksource tsc-early Feb 9 12:44:09.563444 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 12:44:09.563449 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 12:44:09.563454 kernel: pnp: PnP ACPI init Feb 9 12:44:09.563498 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 12:44:09.563540 kernel: pnp 00:02: [dma 0 disabled] Feb 9 12:44:09.563582 kernel: pnp 00:03: [dma 0 disabled] Feb 9 12:44:09.563624 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 12:44:09.563661 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 12:44:09.563703 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 12:44:09.563743 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 12:44:09.563780 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 12:44:09.563817 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 12:44:09.563854 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 12:44:09.563892 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 12:44:09.563929 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 12:44:09.563965 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 12:44:09.564003 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 12:44:09.564042 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 12:44:09.564079 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 12:44:09.564117 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 12:44:09.564153 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 12:44:09.564190 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 12:44:09.564226 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 12:44:09.564263 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 12:44:09.564303 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 12:44:09.564311 kernel: pnp: PnP ACPI: found 10 devices Feb 9 12:44:09.564316 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 12:44:09.564323 kernel: NET: Registered PF_INET protocol family Feb 9 12:44:09.564329 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 12:44:09.564334 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 12:44:09.564340 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 12:44:09.564345 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 12:44:09.564350 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 12:44:09.564356 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 12:44:09.564361 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 12:44:09.564367 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 12:44:09.564373 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 12:44:09.564379 kernel: NET: Registered PF_XDP protocol family Feb 9 12:44:09.564429 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7b800000-0x7b800fff 64bit] Feb 9 12:44:09.564472 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7b801000-0x7b801fff 64bit] Feb 9 12:44:09.564513 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7b802000-0x7b802fff 64bit] Feb 9 12:44:09.564556 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 12:44:09.564600 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 12:44:09.564643 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 12:44:09.564689 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 12:44:09.564732 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 12:44:09.564775 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 12:44:09.564817 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Feb 9 12:44:09.564860 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 12:44:09.564902 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 12:44:09.564943 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 12:44:09.564985 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 12:44:09.565027 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Feb 9 12:44:09.565068 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 12:44:09.565110 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 12:44:09.565151 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Feb 9 12:44:09.565193 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 12:44:09.565237 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 12:44:09.565280 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 12:44:09.565323 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 12:44:09.565364 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 12:44:09.565411 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 12:44:09.565453 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 12:44:09.565492 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 12:44:09.565528 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 12:44:09.565566 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 12:44:09.565603 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 12:44:09.565638 kernel: pci_bus 0000:00: resource 7 [mem 0x7b800000-0xdfffffff window] Feb 9 12:44:09.565674 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 12:44:09.565716 kernel: pci_bus 0000:02: resource 1 [mem 0x7e100000-0x7e2fffff] Feb 9 12:44:09.565755 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 12:44:09.565798 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Feb 9 12:44:09.565839 kernel: pci_bus 0000:04: resource 1 [mem 0x7e400000-0x7e4fffff] Feb 9 12:44:09.565882 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Feb 9 12:44:09.565920 kernel: pci_bus 0000:05: resource 1 [mem 0x7e300000-0x7e3fffff] Feb 9 12:44:09.565963 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 12:44:09.566001 kernel: pci_bus 0000:07: resource 1 [mem 0x7d000000-0x7e0fffff] Feb 9 12:44:09.566042 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Feb 9 12:44:09.566082 kernel: pci_bus 0000:08: resource 1 [mem 0x7d000000-0x7e0fffff] Feb 9 12:44:09.566090 kernel: PCI: CLS 64 bytes, default 64 Feb 9 12:44:09.566096 kernel: DMAR: No ATSR found Feb 9 12:44:09.566101 kernel: DMAR: No SATC found Feb 9 12:44:09.566107 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Feb 9 12:44:09.566112 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Feb 9 12:44:09.566118 kernel: DMAR: IOMMU feature nwfs inconsistent Feb 9 12:44:09.566123 kernel: DMAR: IOMMU feature pasid inconsistent Feb 9 12:44:09.566128 kernel: DMAR: IOMMU feature eafs inconsistent Feb 9 12:44:09.566134 kernel: DMAR: IOMMU feature prs inconsistent Feb 9 12:44:09.566140 kernel: DMAR: IOMMU feature nest inconsistent Feb 9 12:44:09.566146 kernel: DMAR: IOMMU feature mts inconsistent Feb 9 12:44:09.566151 kernel: DMAR: IOMMU feature sc_support inconsistent Feb 9 12:44:09.566156 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Feb 9 12:44:09.566162 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 12:44:09.566167 kernel: DMAR: dmar1: Using Queued invalidation Feb 9 12:44:09.566209 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 12:44:09.566251 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 12:44:09.566293 kernel: pci 0000:00:01.1: Adding to iommu group 1 Feb 9 12:44:09.566337 kernel: pci 0000:00:02.0: Adding to iommu group 2 Feb 9 12:44:09.566378 kernel: pci 0000:00:08.0: Adding to iommu group 3 Feb 9 12:44:09.566425 kernel: pci 0000:00:12.0: Adding to iommu group 4 Feb 9 12:44:09.566466 kernel: pci 0000:00:14.0: Adding to iommu group 5 Feb 9 12:44:09.566508 kernel: pci 0000:00:14.2: Adding to iommu group 5 Feb 9 12:44:09.566548 kernel: pci 0000:00:15.0: Adding to iommu group 6 Feb 9 12:44:09.566589 kernel: pci 0000:00:15.1: Adding to iommu group 6 Feb 9 12:44:09.566629 kernel: pci 0000:00:16.0: Adding to iommu group 7 Feb 9 12:44:09.566671 kernel: pci 0000:00:16.1: Adding to iommu group 7 Feb 9 12:44:09.566712 kernel: pci 0000:00:16.4: Adding to iommu group 7 Feb 9 12:44:09.566753 kernel: pci 0000:00:17.0: Adding to iommu group 8 Feb 9 12:44:09.566794 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Feb 9 12:44:09.566835 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Feb 9 12:44:09.566877 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Feb 9 12:44:09.566918 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Feb 9 12:44:09.566960 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Feb 9 12:44:09.567003 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Feb 9 12:44:09.567043 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Feb 9 12:44:09.567086 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Feb 9 12:44:09.567126 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Feb 9 12:44:09.567170 kernel: pci 0000:02:00.0: Adding to iommu group 1 Feb 9 12:44:09.567212 kernel: pci 0000:02:00.1: Adding to iommu group 1 Feb 9 12:44:09.567256 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 12:44:09.567298 kernel: pci 0000:05:00.0: Adding to iommu group 17 Feb 9 12:44:09.567344 kernel: pci 0000:07:00.0: Adding to iommu group 18 Feb 9 12:44:09.567391 kernel: pci 0000:08:00.0: Adding to iommu group 18 Feb 9 12:44:09.567401 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 12:44:09.567408 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 12:44:09.567415 kernel: software IO TLB: mapped [mem 0x00000000680c5000-0x000000006c0c5000] (64MB) Feb 9 12:44:09.567421 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Feb 9 12:44:09.567428 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 12:44:09.567434 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 12:44:09.567442 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 12:44:09.567449 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Feb 9 12:44:09.567504 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 12:44:09.567514 kernel: Initialise system trusted keyrings Feb 9 12:44:09.567521 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 12:44:09.567527 kernel: Key type asymmetric registered Feb 9 12:44:09.567534 kernel: Asymmetric key parser 'x509' registered Feb 9 12:44:09.567540 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 12:44:09.567549 kernel: io scheduler mq-deadline registered Feb 9 12:44:09.567555 kernel: io scheduler kyber registered Feb 9 12:44:09.567562 kernel: io scheduler bfq registered Feb 9 12:44:09.567612 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Feb 9 12:44:09.567664 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Feb 9 12:44:09.567716 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Feb 9 12:44:09.567768 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Feb 9 12:44:09.567819 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Feb 9 12:44:09.567872 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Feb 9 12:44:09.567925 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Feb 9 12:44:09.567980 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 12:44:09.567990 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 12:44:09.567997 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 12:44:09.568003 kernel: pstore: Registered erst as persistent store backend Feb 9 12:44:09.568010 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 12:44:09.568017 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 12:44:09.568025 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 12:44:09.568031 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 12:44:09.568083 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 12:44:09.568093 kernel: i8042: PNP: No PS/2 controller found. Feb 9 12:44:09.568139 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 12:44:09.568185 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 12:44:09.568233 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T12:44:08 UTC (1707482648) Feb 9 12:44:09.568279 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 12:44:09.568290 kernel: fail to initialize ptp_kvm Feb 9 12:44:09.568297 kernel: intel_pstate: Intel P-state driver initializing Feb 9 12:44:09.568303 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 12:44:09.568310 kernel: intel_pstate: HWP enabled Feb 9 12:44:09.568316 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 12:44:09.568323 kernel: vesafb: scrolling: redraw Feb 9 12:44:09.568329 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 12:44:09.568336 kernel: vesafb: framebuffer at 0x7d000000, mapped to 0x0000000018a959d9, using 768k, total 768k Feb 9 12:44:09.568344 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 12:44:09.568350 kernel: fb0: VESA VGA frame buffer device Feb 9 12:44:09.568357 kernel: NET: Registered PF_INET6 protocol family Feb 9 12:44:09.568363 kernel: Segment Routing with IPv6 Feb 9 12:44:09.568370 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 12:44:09.568376 kernel: NET: Registered PF_PACKET protocol family Feb 9 12:44:09.568383 kernel: Key type dns_resolver registered Feb 9 12:44:09.568391 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 12:44:09.568398 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 12:44:09.568405 kernel: IPI shorthand broadcast: enabled Feb 9 12:44:09.568413 kernel: sched_clock: Marking stable (1837674045, 1353751078)->(4610062329, -1418637206) Feb 9 12:44:09.568419 kernel: registered taskstats version 1 Feb 9 12:44:09.568426 kernel: Loading compiled-in X.509 certificates Feb 9 12:44:09.568432 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 12:44:09.568439 kernel: Key type .fscrypt registered Feb 9 12:44:09.568445 kernel: Key type fscrypt-provisioning registered Feb 9 12:44:09.568452 kernel: pstore: Using crash dump compression: deflate Feb 9 12:44:09.568458 kernel: ima: Allocated hash algorithm: sha1 Feb 9 12:44:09.568466 kernel: ima: No architecture policies found Feb 9 12:44:09.568472 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 12:44:09.568479 kernel: Write protecting the kernel read-only data: 28672k Feb 9 12:44:09.568485 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 12:44:09.568492 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 12:44:09.568498 kernel: Run /init as init process Feb 9 12:44:09.568505 kernel: with arguments: Feb 9 12:44:09.568511 kernel: /init Feb 9 12:44:09.568518 kernel: with environment: Feb 9 12:44:09.568525 kernel: HOME=/ Feb 9 12:44:09.568531 kernel: TERM=linux Feb 9 12:44:09.568538 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 12:44:09.568546 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 12:44:09.568554 systemd[1]: Detected architecture x86-64. Feb 9 12:44:09.568561 systemd[1]: Running in initrd. Feb 9 12:44:09.568567 systemd[1]: No hostname configured, using default hostname. Feb 9 12:44:09.568574 systemd[1]: Hostname set to . Feb 9 12:44:09.568581 systemd[1]: Initializing machine ID from random generator. Feb 9 12:44:09.568589 systemd[1]: Queued start job for default target initrd.target. Feb 9 12:44:09.568595 systemd[1]: Started systemd-ask-password-console.path. Feb 9 12:44:09.568602 systemd[1]: Reached target cryptsetup.target. Feb 9 12:44:09.568608 systemd[1]: Reached target paths.target. Feb 9 12:44:09.568615 systemd[1]: Reached target slices.target. Feb 9 12:44:09.568621 systemd[1]: Reached target swap.target. Feb 9 12:44:09.568628 systemd[1]: Reached target timers.target. Feb 9 12:44:09.568636 systemd[1]: Listening on iscsid.socket. Feb 9 12:44:09.568643 systemd[1]: Listening on iscsiuio.socket. Feb 9 12:44:09.568649 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 12:44:09.568656 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 12:44:09.568663 systemd[1]: Listening on systemd-journald.socket. Feb 9 12:44:09.568670 systemd[1]: Listening on systemd-networkd.socket. Feb 9 12:44:09.568676 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Feb 9 12:44:09.568683 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 12:44:09.568691 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Feb 9 12:44:09.568697 kernel: clocksource: Switched to clocksource tsc Feb 9 12:44:09.568704 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 12:44:09.568711 systemd[1]: Reached target sockets.target. Feb 9 12:44:09.568718 systemd[1]: Starting kmod-static-nodes.service... Feb 9 12:44:09.568725 systemd[1]: Finished network-cleanup.service. Feb 9 12:44:09.568731 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 12:44:09.568738 systemd[1]: Starting systemd-journald.service... Feb 9 12:44:09.568745 systemd[1]: Starting systemd-modules-load.service... Feb 9 12:44:09.568755 systemd-journald[267]: Journal started Feb 9 12:44:09.568784 systemd-journald[267]: Runtime Journal (/run/log/journal/be14e000c34244209292ee36130d74da) is 8.0M, max 636.8M, 628.8M free. Feb 9 12:44:09.570908 systemd-modules-load[268]: Inserted module 'overlay' Feb 9 12:44:09.576000 audit: BPF prog-id=6 op=LOAD Feb 9 12:44:09.595427 kernel: audit: type=1334 audit(1707482649.576:2): prog-id=6 op=LOAD Feb 9 12:44:09.595455 systemd[1]: Starting systemd-resolved.service... Feb 9 12:44:09.643437 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 12:44:09.643453 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 12:44:09.675396 kernel: Bridge firewalling registered Feb 9 12:44:09.675412 systemd[1]: Started systemd-journald.service. Feb 9 12:44:09.690349 systemd-modules-load[268]: Inserted module 'br_netfilter' Feb 9 12:44:09.738581 kernel: audit: type=1130 audit(1707482649.697:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:09.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:09.696022 systemd-resolved[270]: Positive Trust Anchors: Feb 9 12:44:09.813740 kernel: SCSI subsystem initialized Feb 9 12:44:09.813756 kernel: audit: type=1130 audit(1707482649.747:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:09.813764 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 12:44:09.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:09.696027 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 12:44:09.915594 kernel: device-mapper: uevent: version 1.0.3 Feb 9 12:44:09.915850 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 12:44:09.915858 kernel: audit: type=1130 audit(1707482649.870:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:09.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:09.696046 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 12:44:09.989657 kernel: audit: type=1130 audit(1707482649.923:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:09.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:09.697605 systemd-resolved[270]: Defaulting to hostname 'linux'. Feb 9 12:44:09.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:09.698620 systemd[1]: Started systemd-resolved.service. Feb 9 12:44:10.098928 kernel: audit: type=1130 audit(1707482649.997:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:10.099014 kernel: audit: type=1130 audit(1707482650.051:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:10.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:09.748549 systemd[1]: Finished kmod-static-nodes.service. Feb 9 12:44:09.871782 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 12:44:09.916253 systemd-modules-load[268]: Inserted module 'dm_multipath' Feb 9 12:44:09.924803 systemd[1]: Finished systemd-modules-load.service. Feb 9 12:44:09.998766 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 12:44:10.052750 systemd[1]: Reached target nss-lookup.target. Feb 9 12:44:10.107988 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 12:44:10.127900 systemd[1]: Starting systemd-sysctl.service... Feb 9 12:44:10.128189 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 12:44:10.131013 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 12:44:10.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:10.131735 systemd[1]: Finished systemd-sysctl.service. Feb 9 12:44:10.180613 kernel: audit: type=1130 audit(1707482650.129:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:10.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:10.192746 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 12:44:10.256488 kernel: audit: type=1130 audit(1707482650.191:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:10.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:10.249011 systemd[1]: Starting dracut-cmdline.service... Feb 9 12:44:10.270517 dracut-cmdline[295]: dracut-dracut-053 Feb 9 12:44:10.270517 dracut-cmdline[295]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 12:44:10.270517 dracut-cmdline[295]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 12:44:10.337493 kernel: Loading iSCSI transport class v2.0-870. Feb 9 12:44:10.337507 kernel: iscsi: registered transport (tcp) Feb 9 12:44:10.385787 kernel: iscsi: registered transport (qla4xxx) Feb 9 12:44:10.385805 kernel: QLogic iSCSI HBA Driver Feb 9 12:44:10.401870 systemd[1]: Finished dracut-cmdline.service. Feb 9 12:44:10.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:10.412378 systemd[1]: Starting dracut-pre-udev.service... Feb 9 12:44:10.483423 kernel: raid6: avx2x4 gen() 42383 MB/s Feb 9 12:44:10.518422 kernel: raid6: avx2x4 xor() 21796 MB/s Feb 9 12:44:10.553421 kernel: raid6: avx2x2 gen() 54996 MB/s Feb 9 12:44:10.588424 kernel: raid6: avx2x2 xor() 32841 MB/s Feb 9 12:44:10.623427 kernel: raid6: avx2x1 gen() 46262 MB/s Feb 9 12:44:10.658421 kernel: raid6: avx2x1 xor() 28467 MB/s Feb 9 12:44:10.692452 kernel: raid6: sse2x4 gen() 21799 MB/s Feb 9 12:44:10.726455 kernel: raid6: sse2x4 xor() 11984 MB/s Feb 9 12:44:10.760452 kernel: raid6: sse2x2 gen() 22110 MB/s Feb 9 12:44:10.794425 kernel: raid6: sse2x2 xor() 13724 MB/s Feb 9 12:44:10.828453 kernel: raid6: sse2x1 gen() 18681 MB/s Feb 9 12:44:10.879966 kernel: raid6: sse2x1 xor() 9129 MB/s Feb 9 12:44:10.879981 kernel: raid6: using algorithm avx2x2 gen() 54996 MB/s Feb 9 12:44:10.879988 kernel: raid6: .... xor() 32841 MB/s, rmw enabled Feb 9 12:44:10.898007 kernel: raid6: using avx2x2 recovery algorithm Feb 9 12:44:10.943399 kernel: xor: automatically using best checksumming function avx Feb 9 12:44:11.022438 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 12:44:11.027181 systemd[1]: Finished dracut-pre-udev.service. Feb 9 12:44:11.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:11.026000 audit: BPF prog-id=7 op=LOAD Feb 9 12:44:11.026000 audit: BPF prog-id=8 op=LOAD Feb 9 12:44:11.028123 systemd[1]: Starting systemd-udevd.service... Feb 9 12:44:11.036577 systemd-udevd[477]: Using default interface naming scheme 'v252'. Feb 9 12:44:11.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:11.047941 systemd[1]: Started systemd-udevd.service. Feb 9 12:44:11.087505 dracut-pre-trigger[487]: rd.md=0: removing MD RAID activation Feb 9 12:44:11.064459 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 12:44:11.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:11.091946 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 12:44:11.105275 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 12:44:11.171023 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 12:44:11.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:11.198400 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 12:44:11.200402 kernel: libata version 3.00 loaded. Feb 9 12:44:11.200427 kernel: ACPI: bus type USB registered Feb 9 12:44:11.234805 kernel: usbcore: registered new interface driver usbfs Feb 9 12:44:11.234872 kernel: usbcore: registered new interface driver hub Feb 9 12:44:11.269738 kernel: usbcore: registered new device driver usb Feb 9 12:44:11.270396 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 12:44:11.304698 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 12:44:11.305395 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 12:44:11.338395 kernel: AES CTR mode by8 optimization enabled Feb 9 12:44:11.340395 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 12:44:11.340480 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Feb 9 12:44:11.375221 kernel: pps pps0: new PPS source ptp0 Feb 9 12:44:11.375337 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 12:44:11.375397 kernel: igb 0000:04:00.0: added PHC on eth0 Feb 9 12:44:11.428707 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 12:44:11.428807 kernel: scsi host0: ahci Feb 9 12:44:11.428826 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:24:4c Feb 9 12:44:11.429395 kernel: mlx5_core 0000:02:00.0: firmware version: 14.29.2002 Feb 9 12:44:11.429468 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 12:44:11.475894 kernel: scsi host1: ahci Feb 9 12:44:11.475999 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Feb 9 12:44:11.476067 kernel: scsi host2: ahci Feb 9 12:44:11.494745 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 12:44:11.522411 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 12:44:11.534426 kernel: scsi host3: ahci Feb 9 12:44:11.534451 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 12:44:11.534515 kernel: pps pps1: new PPS source ptp1 Feb 9 12:44:11.534573 kernel: igb 0000:05:00.0: added PHC on eth1 Feb 9 12:44:11.534628 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 12:44:11.534678 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:24:4d Feb 9 12:44:11.534727 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Feb 9 12:44:11.534775 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 12:44:11.564383 kernel: scsi host4: ahci Feb 9 12:44:11.591252 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 12:44:11.591328 kernel: scsi host5: ahci Feb 9 12:44:11.592394 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 12:44:11.592464 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Feb 9 12:44:11.603395 kernel: scsi host6: ahci Feb 9 12:44:11.615468 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 12:44:11.615554 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 12:44:11.615606 kernel: hub 1-0:1.0: USB hub found Feb 9 12:44:11.645154 kernel: scsi host7: ahci Feb 9 12:44:11.658166 kernel: hub 1-0:1.0: 16 ports detected Feb 9 12:44:11.658239 kernel: ata1: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516100 irq 134 Feb 9 12:44:11.675452 kernel: hub 2-0:1.0: USB hub found Feb 9 12:44:11.675559 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 12:44:11.675644 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Feb 9 12:44:11.702340 kernel: ata2: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516180 irq 134 Feb 9 12:44:11.727798 kernel: hub 2-0:1.0: 10 ports detected Feb 9 12:44:11.727871 kernel: ata3: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516200 irq 134 Feb 9 12:44:11.741663 kernel: usb: port power management may be unreliable Feb 9 12:44:11.741679 kernel: ata4: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516280 irq 134 Feb 9 12:44:11.940681 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 12:44:11.940711 kernel: ata5: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516300 irq 134 Feb 9 12:44:12.010464 kernel: ata6: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516380 irq 134 Feb 9 12:44:12.046847 kernel: ata7: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516400 irq 134 Feb 9 12:44:12.046864 kernel: ata8: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516480 irq 134 Feb 9 12:44:12.099018 kernel: hub 1-14:1.0: USB hub found Feb 9 12:44:12.099101 kernel: hub 1-14:1.0: 4 ports detected Feb 9 12:44:12.118445 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 12:44:12.358472 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 12:44:12.402209 kernel: mlx5_core 0000:02:00.1: firmware version: 14.29.2002 Feb 9 12:44:12.402322 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 12:44:12.402336 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 12:44:12.402394 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 12:44:12.439395 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 12:44:12.439427 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 12:44:12.473392 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 12:44:12.489427 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 12:44:12.504392 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 12:44:12.520425 kernel: ata8: SATA link down (SStatus 0 SControl 300) Feb 9 12:44:12.535425 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 12:44:12.550431 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 12:44:12.567421 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 12:44:12.584394 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 12:44:12.599445 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 12:44:12.628507 kernel: ata2.00: Features: NCQ-prio Feb 9 12:44:12.628519 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 12:44:12.658507 kernel: ata1.00: Features: NCQ-prio Feb 9 12:44:12.677450 kernel: ata2.00: configured for UDMA/133 Feb 9 12:44:12.677467 kernel: ata1.00: configured for UDMA/133 Feb 9 12:44:12.690445 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 12:44:12.690517 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 12:44:12.726395 kernel: port_module: 9 callbacks suppressed Feb 9 12:44:12.726410 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Feb 9 12:44:12.726474 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 12:44:12.757397 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 12:44:12.824226 kernel: usbcore: registered new interface driver usbhid Feb 9 12:44:12.824247 kernel: usbhid: USB HID core driver Feb 9 12:44:12.859446 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 12:44:12.876447 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:44:12.876462 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 12:44:12.891149 kernel: sd 1:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 12:44:12.891228 kernel: sd 0:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 12:44:12.925950 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Feb 9 12:44:12.926033 kernel: sd 0:0:0:0: [sdb] 4096-byte physical blocks Feb 9 12:44:12.926095 kernel: sd 0:0:0:0: [sdb] Write Protect is off Feb 9 12:44:12.926161 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 12:44:12.926227 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 12:44:12.926235 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 12:44:12.940804 kernel: sd 1:0:0:0: [sda] Write Protect is off Feb 9 12:44:12.955427 kernel: sd 0:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 12:44:12.988423 kernel: sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 12:44:12.988497 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 12:44:13.000199 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 12:44:13.031813 kernel: sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 12:44:13.157421 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 12:44:13.173316 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:44:13.173331 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 12:44:13.188543 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk Feb 9 12:44:13.204448 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 12:44:13.235187 kernel: GPT:9289727 != 937703087 Feb 9 12:44:13.235203 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 12:44:13.251576 kernel: GPT:9289727 != 937703087 Feb 9 12:44:13.265579 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 12:44:13.281345 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 12:44:13.313109 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:44:13.313124 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Feb 9 12:44:13.348397 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth1 Feb 9 12:44:13.381422 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth0 Feb 9 12:44:13.381545 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (544) Feb 9 12:44:13.392184 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 12:44:13.403498 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 12:44:13.409523 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 12:44:13.438927 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 12:44:13.466638 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 12:44:13.486412 systemd[1]: Starting disk-uuid.service... Feb 9 12:44:13.522527 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:44:13.522542 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 12:44:13.522597 disk-uuid[693]: Primary Header is updated. Feb 9 12:44:13.522597 disk-uuid[693]: Secondary Entries is updated. Feb 9 12:44:13.522597 disk-uuid[693]: Secondary Header is updated. Feb 9 12:44:13.578484 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:44:13.578494 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 12:44:13.578501 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:44:13.604424 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 12:44:14.584463 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:44:14.603172 disk-uuid[694]: The operation has completed successfully. Feb 9 12:44:14.611534 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 12:44:14.642918 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 12:44:14.735860 kernel: audit: type=1130 audit(1707482654.649:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:14.735875 kernel: audit: type=1131 audit(1707482654.649:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:14.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:14.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:14.642963 systemd[1]: Finished disk-uuid.service. Feb 9 12:44:14.764492 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 12:44:14.651071 systemd[1]: Starting verity-setup.service... Feb 9 12:44:14.794128 systemd[1]: Found device dev-mapper-usr.device. Feb 9 12:44:14.803328 systemd[1]: Mounting sysusr-usr.mount... Feb 9 12:44:14.817515 systemd[1]: Finished verity-setup.service. Feb 9 12:44:14.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:14.869394 kernel: audit: type=1130 audit(1707482654.823:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:14.896428 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 12:44:14.896642 systemd[1]: Mounted sysusr-usr.mount. Feb 9 12:44:14.903686 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 12:44:14.904069 systemd[1]: Starting ignition-setup.service... Feb 9 12:44:14.987915 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 12:44:14.987930 kernel: BTRFS info (device sda6): using free space tree Feb 9 12:44:14.987938 kernel: BTRFS info (device sda6): has skinny extents Feb 9 12:44:14.987948 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 12:44:14.934886 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 12:44:14.996933 systemd[1]: Finished ignition-setup.service. Feb 9 12:44:15.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:15.014754 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 12:44:15.115115 kernel: audit: type=1130 audit(1707482655.013:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:15.115130 kernel: audit: type=1130 audit(1707482655.067:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:15.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:15.069040 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 12:44:15.149563 kernel: audit: type=1334 audit(1707482655.127:24): prog-id=9 op=LOAD Feb 9 12:44:15.127000 audit: BPF prog-id=9 op=LOAD Feb 9 12:44:15.129371 systemd[1]: Starting systemd-networkd.service... Feb 9 12:44:15.163298 systemd-networkd[882]: lo: Link UP Feb 9 12:44:15.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:15.185742 ignition[871]: Ignition 2.14.0 Feb 9 12:44:15.234653 kernel: audit: type=1130 audit(1707482655.172:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:15.163301 systemd-networkd[882]: lo: Gained carrier Feb 9 12:44:15.185746 ignition[871]: Stage: fetch-offline Feb 9 12:44:15.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:15.163584 systemd-networkd[882]: Enumeration completed Feb 9 12:44:15.385499 kernel: audit: type=1130 audit(1707482655.248:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:15.385516 kernel: audit: type=1130 audit(1707482655.303:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:15.385524 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 12:44:15.385610 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Feb 9 12:44:15.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:15.185770 ignition[871]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:44:15.163656 systemd[1]: Started systemd-networkd.service. Feb 9 12:44:15.185783 ignition[871]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:44:15.164287 systemd-networkd[882]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 12:44:15.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:15.188682 ignition[871]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:44:15.461602 iscsid[909]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 12:44:15.461602 iscsid[909]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 12:44:15.461602 iscsid[909]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 12:44:15.461602 iscsid[909]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 12:44:15.461602 iscsid[909]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 12:44:15.461602 iscsid[909]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 12:44:15.461602 iscsid[909]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 12:44:15.602610 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 9 12:44:15.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:15.173539 systemd[1]: Reached target network.target. Feb 9 12:44:15.188746 ignition[871]: parsed url from cmdline: "" Feb 9 12:44:15.218213 unknown[871]: fetched base config from "system" Feb 9 12:44:15.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:15.188748 ignition[871]: no config URL provided Feb 9 12:44:15.218217 unknown[871]: fetched user config from "system" Feb 9 12:44:15.188750 ignition[871]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 12:44:15.228108 systemd[1]: Starting iscsiuio.service... Feb 9 12:44:15.192770 ignition[871]: parsing config with SHA512: e33ead94ae4d35e594822d592d89c51695dec704802c05de3bc103e8d2754259e5923b55c0690a69cab6e4c26922b5dd2004763a51876feeb4162f4b742a8daf Feb 9 12:44:15.242696 systemd[1]: Started iscsiuio.service. Feb 9 12:44:15.218665 ignition[871]: fetch-offline: fetch-offline passed Feb 9 12:44:15.249666 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 12:44:15.218668 ignition[871]: POST message to Packet Timeline Feb 9 12:44:15.304653 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 12:44:15.218672 ignition[871]: POST Status error: resource requires networking Feb 9 12:44:15.305085 systemd[1]: Starting ignition-kargs.service... Feb 9 12:44:15.218701 ignition[871]: Ignition finished successfully Feb 9 12:44:15.372232 systemd-networkd[882]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 12:44:15.374812 ignition[898]: Ignition 2.14.0 Feb 9 12:44:15.399988 systemd[1]: Starting iscsid.service... Feb 9 12:44:15.374815 ignition[898]: Stage: kargs Feb 9 12:44:15.417527 systemd[1]: Started iscsid.service. Feb 9 12:44:15.374873 ignition[898]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:44:15.432874 systemd[1]: Starting dracut-initqueue.service... Feb 9 12:44:15.374883 ignition[898]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:44:15.451496 systemd[1]: Finished dracut-initqueue.service. Feb 9 12:44:15.376197 ignition[898]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:44:15.469616 systemd[1]: Reached target remote-fs-pre.target. Feb 9 12:44:15.378339 ignition[898]: kargs: kargs passed Feb 9 12:44:15.515528 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 12:44:15.378347 ignition[898]: POST message to Packet Timeline Feb 9 12:44:15.543896 systemd[1]: Reached target remote-fs.target. Feb 9 12:44:15.378367 ignition[898]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:44:15.576295 systemd[1]: Starting dracut-pre-mount.service... Feb 9 12:44:15.381950 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:38229->[::1]:53: read: connection refused Feb 9 12:44:15.590843 systemd-networkd[882]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 12:44:15.582288 ignition[898]: GET https://metadata.packet.net/metadata: attempt #2 Feb 9 12:44:15.619672 systemd-networkd[882]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 12:44:15.582734 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:34252->[::1]:53: read: connection refused Feb 9 12:44:15.620811 systemd[1]: Finished dracut-pre-mount.service. Feb 9 12:44:15.650483 systemd-networkd[882]: enp2s0f1np1: Link UP Feb 9 12:44:15.650919 systemd-networkd[882]: enp2s0f1np1: Gained carrier Feb 9 12:44:15.663910 systemd-networkd[882]: enp2s0f0np0: Link UP Feb 9 12:44:15.664271 systemd-networkd[882]: eno2: Link UP Feb 9 12:44:15.664641 systemd-networkd[882]: eno1: Link UP Feb 9 12:44:15.983138 ignition[898]: GET https://metadata.packet.net/metadata: attempt #3 Feb 9 12:44:15.984567 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:39682->[::1]:53: read: connection refused Feb 9 12:44:16.408770 systemd-networkd[882]: enp2s0f0np0: Gained carrier Feb 9 12:44:16.417634 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Feb 9 12:44:16.441767 systemd-networkd[882]: enp2s0f0np0: DHCPv4 address 139.178.91.169/31, gateway 139.178.91.168 acquired from 145.40.83.140 Feb 9 12:44:16.784945 ignition[898]: GET https://metadata.packet.net/metadata: attempt #4 Feb 9 12:44:16.786433 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:53443->[::1]:53: read: connection refused Feb 9 12:44:17.219882 systemd-networkd[882]: enp2s0f1np1: Gained IPv6LL Feb 9 12:44:18.051873 systemd-networkd[882]: enp2s0f0np0: Gained IPv6LL Feb 9 12:44:18.387669 ignition[898]: GET https://metadata.packet.net/metadata: attempt #5 Feb 9 12:44:18.389089 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:37981->[::1]:53: read: connection refused Feb 9 12:44:21.589516 ignition[898]: GET https://metadata.packet.net/metadata: attempt #6 Feb 9 12:44:21.627756 ignition[898]: GET result: OK Feb 9 12:44:21.846012 ignition[898]: Ignition finished successfully Feb 9 12:44:21.849177 systemd[1]: Finished ignition-kargs.service. Feb 9 12:44:21.931154 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 12:44:21.931170 kernel: audit: type=1130 audit(1707482661.860:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:21.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:21.870290 ignition[928]: Ignition 2.14.0 Feb 9 12:44:21.863888 systemd[1]: Starting ignition-disks.service... Feb 9 12:44:21.870293 ignition[928]: Stage: disks Feb 9 12:44:21.870351 ignition[928]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:44:21.870360 ignition[928]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:44:21.872896 ignition[928]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:44:21.873609 ignition[928]: disks: disks passed Feb 9 12:44:21.873612 ignition[928]: POST message to Packet Timeline Feb 9 12:44:21.873622 ignition[928]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:44:21.907605 ignition[928]: GET result: OK Feb 9 12:44:22.087995 ignition[928]: Ignition finished successfully Feb 9 12:44:22.090961 systemd[1]: Finished ignition-disks.service. Feb 9 12:44:22.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.106000 systemd[1]: Reached target initrd-root-device.target. Feb 9 12:44:22.190633 kernel: audit: type=1130 audit(1707482662.104:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.175581 systemd[1]: Reached target local-fs-pre.target. Feb 9 12:44:22.175621 systemd[1]: Reached target local-fs.target. Feb 9 12:44:22.199614 systemd[1]: Reached target sysinit.target. Feb 9 12:44:22.214608 systemd[1]: Reached target basic.target. Feb 9 12:44:22.229500 systemd[1]: Starting systemd-fsck-root.service... Feb 9 12:44:22.262531 systemd-fsck[943]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 12:44:22.273920 systemd[1]: Finished systemd-fsck-root.service. Feb 9 12:44:22.362155 kernel: audit: type=1130 audit(1707482662.281:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.362171 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 12:44:22.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.283247 systemd[1]: Mounting sysroot.mount... Feb 9 12:44:22.370037 systemd[1]: Mounted sysroot.mount. Feb 9 12:44:22.383679 systemd[1]: Reached target initrd-root-fs.target. Feb 9 12:44:22.406268 systemd[1]: Mounting sysroot-usr.mount... Feb 9 12:44:22.414246 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 12:44:22.421987 systemd[1]: Starting flatcar-static-network.service... Feb 9 12:44:22.443483 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 12:44:22.443531 systemd[1]: Reached target ignition-diskful.target. Feb 9 12:44:22.462022 systemd[1]: Mounted sysroot-usr.mount. Feb 9 12:44:22.485528 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 12:44:22.529400 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (956) Feb 9 12:44:22.498765 systemd[1]: Starting initrd-setup-root.service... Feb 9 12:44:22.621883 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 12:44:22.621901 kernel: BTRFS info (device sda6): using free space tree Feb 9 12:44:22.621909 kernel: BTRFS info (device sda6): has skinny extents Feb 9 12:44:22.621916 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 12:44:22.621926 initrd-setup-root[961]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 12:44:22.684995 kernel: audit: type=1130 audit(1707482662.629:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.685034 coreos-metadata[950]: Feb 09 12:44:22.545 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 12:44:22.685034 coreos-metadata[950]: Feb 09 12:44:22.578 INFO Fetch successful Feb 9 12:44:22.685034 coreos-metadata[950]: Feb 09 12:44:22.601 INFO wrote hostname ci-3510.3.2-a-524ff09451 to /sysroot/etc/hostname Feb 9 12:44:22.891673 kernel: audit: type=1130 audit(1707482662.692:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.891687 kernel: audit: type=1130 audit(1707482662.756:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.891697 kernel: audit: type=1131 audit(1707482662.756:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.551691 systemd[1]: Finished initrd-setup-root.service. Feb 9 12:44:22.905523 coreos-metadata[951]: Feb 09 12:44:22.544 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 12:44:22.905523 coreos-metadata[951]: Feb 09 12:44:22.566 INFO Fetch successful Feb 9 12:44:22.924578 initrd-setup-root[969]: cut: /sysroot/etc/group: No such file or directory Feb 9 12:44:22.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.631796 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 12:44:23.004625 kernel: audit: type=1130 audit(1707482662.938:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:23.004652 initrd-setup-root[977]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 12:44:22.693714 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 9 12:44:23.024602 initrd-setup-root[985]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 12:44:22.693754 systemd[1]: Finished flatcar-static-network.service. Feb 9 12:44:23.042575 ignition[1025]: INFO : Ignition 2.14.0 Feb 9 12:44:23.042575 ignition[1025]: INFO : Stage: mount Feb 9 12:44:23.042575 ignition[1025]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:44:23.042575 ignition[1025]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:44:23.042575 ignition[1025]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:44:23.042575 ignition[1025]: INFO : mount: mount passed Feb 9 12:44:23.042575 ignition[1025]: INFO : POST message to Packet Timeline Feb 9 12:44:23.042575 ignition[1025]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:44:23.042575 ignition[1025]: INFO : GET result: OK Feb 9 12:44:22.757687 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 12:44:22.879058 systemd[1]: Starting ignition-mount.service... Feb 9 12:44:22.899044 systemd[1]: Starting sysroot-boot.service... Feb 9 12:44:23.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:23.212694 ignition[1025]: INFO : Ignition finished successfully Feb 9 12:44:23.227600 kernel: audit: type=1130 audit(1707482663.153:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:22.912895 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 12:44:22.912937 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 12:44:23.273482 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1040) Feb 9 12:44:23.273495 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 12:44:22.916424 systemd[1]: Finished sysroot-boot.service. Feb 9 12:44:23.316482 kernel: BTRFS info (device sda6): using free space tree Feb 9 12:44:23.316493 kernel: BTRFS info (device sda6): has skinny extents Feb 9 12:44:23.316502 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 12:44:23.145556 systemd[1]: Finished ignition-mount.service. Feb 9 12:44:23.156565 systemd[1]: Starting ignition-files.service... Feb 9 12:44:23.221321 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 12:44:23.353401 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 12:44:23.384694 unknown[1059]: wrote ssh authorized keys file for user: core Feb 9 12:44:23.398659 ignition[1059]: INFO : Ignition 2.14.0 Feb 9 12:44:23.398659 ignition[1059]: INFO : Stage: files Feb 9 12:44:23.398659 ignition[1059]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:44:23.398659 ignition[1059]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:44:23.398659 ignition[1059]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:44:23.398659 ignition[1059]: DEBUG : files: compiled without relabeling support, skipping Feb 9 12:44:23.398659 ignition[1059]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 12:44:23.398659 ignition[1059]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 12:44:23.398659 ignition[1059]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 12:44:23.398659 ignition[1059]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 12:44:23.398659 ignition[1059]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 12:44:23.398659 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 12:44:23.398659 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 12:44:23.721123 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 12:44:23.774772 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 12:44:23.791685 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar-cgroupv1" Feb 9 12:44:23.791685 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" Feb 9 12:44:23.791685 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 12:44:23.791685 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 12:44:24.270021 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 12:44:24.366832 ignition[1059]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 12:44:24.392662 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 12:44:24.392662 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 12:44:24.392662 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 12:44:24.765049 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 12:44:24.826240 ignition[1059]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 12:44:24.851639 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 12:44:24.851639 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 12:44:24.851639 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 9 12:44:24.964408 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 12:44:25.151001 ignition[1059]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 9 12:44:25.151001 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 12:44:25.191701 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 12:44:25.191701 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 12:44:25.223604 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 12:44:25.601298 ignition[1059]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 12:44:25.601298 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 12:44:25.649602 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 12:44:25.649602 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 12:44:25.681470 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Feb 9 12:44:25.824422 ignition[1059]: DEBUG : files: createFilesystemsFiles: createFiles: op(9): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 12:44:25.824422 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 12:44:25.873603 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1078) Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(10): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 12:44:25.873622 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(10): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem787019998" Feb 9 12:44:25.873622 ignition[1059]: CRITICAL : files: createFilesystemsFiles: createFiles: op(10): op(11): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem787019998": device or resource busy Feb 9 12:44:26.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.181951 ignition[1059]: ERROR : files: createFilesystemsFiles: createFiles: op(10): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem787019998", trying btrfs: device or resource busy Feb 9 12:44:26.181951 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(10): op(12): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem787019998" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(10): op(12): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem787019998" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(10): op(13): [started] unmounting "/mnt/oem787019998" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(10): op(13): [finished] unmounting "/mnt/oem787019998" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: op(14): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: op(14): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: op(15): [started] processing unit "packet-phone-home.service" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: op(15): [finished] processing unit "packet-phone-home.service" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: op(16): [started] processing unit "containerd.service" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: op(16): op(17): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: op(16): op(17): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: op(16): [finished] processing unit "containerd.service" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: op(18): [started] processing unit "prepare-cni-plugins.service" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: op(18): op(19): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 12:44:26.181951 ignition[1059]: INFO : files: op(18): op(19): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 12:44:26.549718 kernel: audit: type=1130 audit(1707482666.122:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.113476 systemd[1]: Finished ignition-files.service. Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(18): [finished] processing unit "prepare-cni-plugins.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(1a): [started] processing unit "prepare-critools.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(1a): op(1b): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(1a): op(1b): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(1a): [finished] processing unit "prepare-critools.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(1c): [started] processing unit "prepare-helm.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(1c): op(1d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(1c): op(1d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(1c): [finished] processing unit "prepare-helm.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-helm.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(1f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(1f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(20): [started] setting preset to enabled for "packet-phone-home.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(20): [finished] setting preset to enabled for "packet-phone-home.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(21): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(22): [started] setting preset to enabled for "prepare-critools.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 12:44:26.564957 ignition[1059]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 12:44:27.113735 kernel: kauditd_printk_skb: 8 callbacks suppressed Feb 9 12:44:27.113795 kernel: audit: type=1131 audit(1707482666.879:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.113822 kernel: audit: type=1131 audit(1707482666.968:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.130201 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 12:44:27.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.191177 initrd-setup-root-after-ignition[1092]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 12:44:27.257358 kernel: audit: type=1131 audit(1707482667.122:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.257373 kernel: audit: type=1131 audit(1707482667.198:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.257487 ignition[1059]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 12:44:27.257487 ignition[1059]: INFO : files: files passed Feb 9 12:44:27.257487 ignition[1059]: INFO : POST message to Packet Timeline Feb 9 12:44:27.257487 ignition[1059]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:44:27.257487 ignition[1059]: INFO : GET result: OK Feb 9 12:44:27.257487 ignition[1059]: INFO : Ignition finished successfully Feb 9 12:44:27.505608 kernel: audit: type=1131 audit(1707482667.264:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.505626 kernel: audit: type=1131 audit(1707482667.363:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.505634 kernel: audit: type=1131 audit(1707482667.444:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.191682 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 12:44:27.574992 kernel: audit: type=1131 audit(1707482667.512:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.575092 iscsid[909]: iscsid shutting down. Feb 9 12:44:27.640656 kernel: audit: type=1131 audit(1707482667.580:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.192059 systemd[1]: Starting ignition-quench.service... Feb 9 12:44:27.709481 kernel: audit: type=1131 audit(1707482667.648:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.213952 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 12:44:27.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.236897 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 12:44:26.236966 systemd[1]: Finished ignition-quench.service. Feb 9 12:44:27.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.268870 systemd[1]: Reached target ignition-complete.target. Feb 9 12:44:27.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.294494 systemd[1]: Starting initrd-parse-etc.service... Feb 9 12:44:27.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.791736 ignition[1107]: INFO : Ignition 2.14.0 Feb 9 12:44:27.791736 ignition[1107]: INFO : Stage: umount Feb 9 12:44:27.791736 ignition[1107]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:44:27.791736 ignition[1107]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:44:27.791736 ignition[1107]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:44:27.791736 ignition[1107]: INFO : umount: umount passed Feb 9 12:44:27.791736 ignition[1107]: INFO : POST message to Packet Timeline Feb 9 12:44:27.791736 ignition[1107]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:44:27.791736 ignition[1107]: INFO : GET result: OK Feb 9 12:44:27.791736 ignition[1107]: INFO : Ignition finished successfully Feb 9 12:44:27.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.320988 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 12:44:27.969000 audit: BPF prog-id=6 op=UNLOAD Feb 9 12:44:26.321045 systemd[1]: Finished initrd-parse-etc.service. Feb 9 12:44:26.349734 systemd[1]: Reached target initrd-fs.target. Feb 9 12:44:27.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.362732 systemd[1]: Reached target initrd.target. Feb 9 12:44:28.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.387793 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 12:44:28.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.389797 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 12:44:26.422939 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 12:44:28.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.446756 systemd[1]: Starting initrd-cleanup.service... Feb 9 12:44:26.487524 systemd[1]: Stopped target nss-lookup.target. Feb 9 12:44:26.503098 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 12:44:28.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.531145 systemd[1]: Stopped target timers.target. Feb 9 12:44:28.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.558089 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 12:44:28.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.558465 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 12:44:26.573375 systemd[1]: Stopped target initrd.target. Feb 9 12:44:28.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.593095 systemd[1]: Stopped target basic.target. Feb 9 12:44:28.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:28.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:26.611083 systemd[1]: Stopped target ignition-complete.target. Feb 9 12:44:26.637070 systemd[1]: Stopped target ignition-diskful.target. Feb 9 12:44:26.663091 systemd[1]: Stopped target initrd-root-device.target. Feb 9 12:44:26.683070 systemd[1]: Stopped target remote-fs.target. Feb 9 12:44:26.702075 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 12:44:26.729108 systemd[1]: Stopped target sysinit.target. Feb 9 12:44:26.755094 systemd[1]: Stopped target local-fs.target. Feb 9 12:44:26.774075 systemd[1]: Stopped target local-fs-pre.target. Feb 9 12:44:26.795048 systemd[1]: Stopped target swap.target. Feb 9 12:44:26.814980 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 12:44:26.815337 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 12:44:26.837290 systemd[1]: Stopped target cryptsetup.target. Feb 9 12:44:26.858978 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 12:44:26.859338 systemd[1]: Stopped dracut-initqueue.service. Feb 9 12:44:26.881241 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 12:44:26.881612 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 12:44:26.990401 systemd[1]: Stopped target paths.target. Feb 9 12:44:27.033639 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 12:44:27.035489 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 12:44:28.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:27.056774 systemd[1]: Stopped target slices.target. Feb 9 12:44:27.076718 systemd[1]: Stopped target sockets.target. Feb 9 12:44:27.097794 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 12:44:28.380000 audit: BPF prog-id=5 op=UNLOAD Feb 9 12:44:28.380000 audit: BPF prog-id=4 op=UNLOAD Feb 9 12:44:28.380000 audit: BPF prog-id=3 op=UNLOAD Feb 9 12:44:28.381000 audit: BPF prog-id=8 op=UNLOAD Feb 9 12:44:28.381000 audit: BPF prog-id=7 op=UNLOAD Feb 9 12:44:27.097932 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 12:44:27.124076 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 12:44:27.124358 systemd[1]: Stopped ignition-files.service. Feb 9 12:44:27.199715 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 12:44:27.199778 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 12:44:27.266185 systemd[1]: Stopping ignition-mount.service... Feb 9 12:44:27.332844 systemd[1]: Stopping iscsid.service... Feb 9 12:44:27.346619 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 12:44:27.346736 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 12:44:28.427404 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Feb 9 12:44:27.365140 systemd[1]: Stopping sysroot-boot.service... Feb 9 12:44:27.430615 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 12:44:27.430720 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 12:44:27.445702 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 12:44:27.445758 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 12:44:27.518165 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 12:44:27.518847 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 12:44:27.518890 systemd[1]: Stopped iscsid.service. Feb 9 12:44:27.581914 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 12:44:27.581952 systemd[1]: Stopped ignition-mount.service. Feb 9 12:44:27.649858 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 12:44:27.649896 systemd[1]: Stopped sysroot-boot.service. Feb 9 12:44:27.716909 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 12:44:27.716953 systemd[1]: Closed iscsid.socket. Feb 9 12:44:27.732641 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 12:44:27.732662 systemd[1]: Stopped ignition-disks.service. Feb 9 12:44:27.750629 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 12:44:27.750656 systemd[1]: Stopped ignition-kargs.service. Feb 9 12:44:27.766574 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 12:44:27.766605 systemd[1]: Stopped ignition-setup.service. Feb 9 12:44:27.783681 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 12:44:27.783745 systemd[1]: Stopped initrd-setup-root.service. Feb 9 12:44:27.799845 systemd[1]: Stopping iscsiuio.service... Feb 9 12:44:27.814473 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 12:44:27.814707 systemd[1]: Stopped iscsiuio.service. Feb 9 12:44:27.821332 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 12:44:27.821565 systemd[1]: Finished initrd-cleanup.service. Feb 9 12:44:27.839809 systemd[1]: Stopped target network.target. Feb 9 12:44:27.870718 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 12:44:27.870847 systemd[1]: Closed iscsiuio.socket. Feb 9 12:44:27.889006 systemd[1]: Stopping systemd-networkd.service... Feb 9 12:44:27.894531 systemd-networkd[882]: enp2s0f0np0: DHCPv6 lease lost Feb 9 12:44:27.898012 systemd[1]: Stopping systemd-resolved.service... Feb 9 12:44:27.903560 systemd-networkd[882]: enp2s0f1np1: DHCPv6 lease lost Feb 9 12:44:28.426000 audit: BPF prog-id=9 op=UNLOAD Feb 9 12:44:27.912270 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 12:44:27.912527 systemd[1]: Stopped systemd-resolved.service. Feb 9 12:44:27.928621 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 12:44:27.928856 systemd[1]: Stopped systemd-networkd.service. Feb 9 12:44:27.941387 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 12:44:27.941489 systemd[1]: Closed systemd-networkd.socket. Feb 9 12:44:27.963082 systemd[1]: Stopping network-cleanup.service... Feb 9 12:44:27.977553 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 12:44:27.977600 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 12:44:27.992639 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 12:44:27.992697 systemd[1]: Stopped systemd-sysctl.service. Feb 9 12:44:28.008065 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 12:44:28.008189 systemd[1]: Stopped systemd-modules-load.service. Feb 9 12:44:28.024042 systemd[1]: Stopping systemd-udevd.service... Feb 9 12:44:28.046365 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 12:44:28.047761 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 12:44:28.047826 systemd[1]: Stopped systemd-udevd.service. Feb 9 12:44:28.060812 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 12:44:28.060838 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 12:44:28.074595 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 12:44:28.074620 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 12:44:28.090589 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 12:44:28.090680 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 12:44:28.106765 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 12:44:28.106885 systemd[1]: Stopped dracut-cmdline.service. Feb 9 12:44:28.122727 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 12:44:28.122871 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 12:44:28.139448 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 12:44:28.154590 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 12:44:28.154616 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 12:44:28.170723 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 12:44:28.170784 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 12:44:28.325377 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 12:44:28.325635 systemd[1]: Stopped network-cleanup.service. Feb 9 12:44:28.342015 systemd[1]: Reached target initrd-switch-root.target. Feb 9 12:44:28.360473 systemd[1]: Starting initrd-switch-root.service... Feb 9 12:44:28.379827 systemd[1]: Switching root. Feb 9 12:44:28.429492 systemd-journald[267]: Journal stopped Feb 9 12:44:32.085789 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 12:44:32.085804 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 12:44:32.085814 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 12:44:32.085821 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 12:44:32.085827 kernel: SELinux: policy capability open_perms=1 Feb 9 12:44:32.085833 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 12:44:32.085840 kernel: SELinux: policy capability always_check_network=0 Feb 9 12:44:32.085847 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 12:44:32.085854 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 12:44:32.085861 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 12:44:32.085867 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 12:44:32.085874 systemd[1]: Successfully loaded SELinux policy in 324.811ms. Feb 9 12:44:32.085882 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.802ms. Feb 9 12:44:32.085890 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 12:44:32.085900 systemd[1]: Detected architecture x86-64. Feb 9 12:44:32.085907 systemd[1]: Detected first boot. Feb 9 12:44:32.085914 systemd[1]: Hostname set to . Feb 9 12:44:32.085922 systemd[1]: Initializing machine ID from random generator. Feb 9 12:44:32.085929 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 12:44:32.085936 systemd[1]: Populated /etc with preset unit settings. Feb 9 12:44:32.085943 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 12:44:32.085952 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 12:44:32.085960 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 12:44:32.085968 systemd[1]: Queued start job for default target multi-user.target. Feb 9 12:44:32.085975 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 12:44:32.085982 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 12:44:32.085990 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 12:44:32.085999 systemd[1]: Created slice system-getty.slice. Feb 9 12:44:32.086007 systemd[1]: Created slice system-modprobe.slice. Feb 9 12:44:32.086015 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 12:44:32.086022 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 12:44:32.086029 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 12:44:32.086037 systemd[1]: Created slice user.slice. Feb 9 12:44:32.086044 systemd[1]: Started systemd-ask-password-console.path. Feb 9 12:44:32.086051 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 12:44:32.086059 systemd[1]: Set up automount boot.automount. Feb 9 12:44:32.086067 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 12:44:32.086074 systemd[1]: Reached target integritysetup.target. Feb 9 12:44:32.086082 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 12:44:32.086089 systemd[1]: Reached target remote-fs.target. Feb 9 12:44:32.086098 systemd[1]: Reached target slices.target. Feb 9 12:44:32.086106 systemd[1]: Reached target swap.target. Feb 9 12:44:32.086114 systemd[1]: Reached target torcx.target. Feb 9 12:44:32.086122 systemd[1]: Reached target veritysetup.target. Feb 9 12:44:32.086130 systemd[1]: Listening on systemd-coredump.socket. Feb 9 12:44:32.086138 systemd[1]: Listening on systemd-initctl.socket. Feb 9 12:44:32.086146 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 12:44:32.086153 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 12:44:32.086161 systemd[1]: Listening on systemd-journald.socket. Feb 9 12:44:32.086169 systemd[1]: Listening on systemd-networkd.socket. Feb 9 12:44:32.086177 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 12:44:32.086184 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 12:44:32.086193 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 12:44:32.086202 systemd[1]: Mounting dev-hugepages.mount... Feb 9 12:44:32.086209 systemd[1]: Mounting dev-mqueue.mount... Feb 9 12:44:32.086217 systemd[1]: Mounting media.mount... Feb 9 12:44:32.086225 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 12:44:32.086234 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 12:44:32.086242 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 12:44:32.086250 systemd[1]: Mounting tmp.mount... Feb 9 12:44:32.086258 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 12:44:32.086265 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 12:44:32.086273 systemd[1]: Starting kmod-static-nodes.service... Feb 9 12:44:32.086281 systemd[1]: Starting modprobe@configfs.service... Feb 9 12:44:32.086289 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 12:44:32.086297 systemd[1]: Starting modprobe@drm.service... Feb 9 12:44:32.086305 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 12:44:32.086313 systemd[1]: Starting modprobe@fuse.service... Feb 9 12:44:32.086322 kernel: fuse: init (API version 7.34) Feb 9 12:44:32.086329 systemd[1]: Starting modprobe@loop.service... Feb 9 12:44:32.086337 kernel: loop: module loaded Feb 9 12:44:32.086345 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 12:44:32.086353 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. Feb 9 12:44:32.086360 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) Feb 9 12:44:32.086369 systemd[1]: Starting systemd-journald.service... Feb 9 12:44:32.086377 systemd[1]: Starting systemd-modules-load.service... Feb 9 12:44:32.086385 kernel: kauditd_printk_skb: 42 callbacks suppressed Feb 9 12:44:32.086395 kernel: audit: type=1305 audit(1707482672.080:94): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 12:44:32.086404 systemd-journald[1299]: Journal started Feb 9 12:44:32.086461 systemd-journald[1299]: Runtime Journal (/run/log/journal/2cce2688db4345fabf8e0b252d8109a9) is 8.0M, max 636.8M, 628.8M free. Feb 9 12:44:31.463000 audit[1]: AVC avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 12:44:31.463000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Feb 9 12:44:32.080000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 12:44:32.080000 audit[1299]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffa17c45a0 a2=4000 a3=7fffa17c463c items=0 ppid=1 pid=1299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:32.080000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 12:44:32.141459 kernel: audit: type=1300 audit(1707482672.080:94): arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffa17c45a0 a2=4000 a3=7fffa17c463c items=0 ppid=1 pid=1299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:32.141492 kernel: audit: type=1327 audit(1707482672.080:94): proctitle="/usr/lib/systemd/systemd-journald" Feb 9 12:44:32.247594 systemd[1]: Starting systemd-network-generator.service... Feb 9 12:44:32.272449 systemd[1]: Starting systemd-remount-fs.service... Feb 9 12:44:32.296395 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 12:44:32.337442 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 12:44:32.354441 systemd[1]: Started systemd-journald.service. Feb 9 12:44:32.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.363135 systemd[1]: Mounted dev-hugepages.mount. Feb 9 12:44:32.408588 kernel: audit: type=1130 audit(1707482672.361:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.414664 systemd[1]: Mounted dev-mqueue.mount. Feb 9 12:44:32.421660 systemd[1]: Mounted media.mount. Feb 9 12:44:32.428648 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 12:44:32.437655 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 12:44:32.446630 systemd[1]: Mounted tmp.mount. Feb 9 12:44:32.453747 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 12:44:32.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.462762 systemd[1]: Finished kmod-static-nodes.service. Feb 9 12:44:32.509393 kernel: audit: type=1130 audit(1707482672.461:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.517725 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 12:44:32.517801 systemd[1]: Finished modprobe@configfs.service. Feb 9 12:44:32.566430 kernel: audit: type=1130 audit(1707482672.516:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.574734 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 12:44:32.574805 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 12:44:32.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.625438 kernel: audit: type=1130 audit(1707482672.573:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.625458 kernel: audit: type=1131 audit(1707482672.573:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.684748 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 12:44:32.684819 systemd[1]: Finished modprobe@drm.service. Feb 9 12:44:32.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.738445 kernel: audit: type=1130 audit(1707482672.683:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.738479 kernel: audit: type=1131 audit(1707482672.683:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.799723 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 12:44:32.799797 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 12:44:32.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.809739 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 12:44:32.809811 systemd[1]: Finished modprobe@fuse.service. Feb 9 12:44:32.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.819729 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 12:44:32.819802 systemd[1]: Finished modprobe@loop.service. Feb 9 12:44:32.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.829811 systemd[1]: Finished systemd-modules-load.service. Feb 9 12:44:32.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.839776 systemd[1]: Finished systemd-network-generator.service. Feb 9 12:44:32.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.849811 systemd[1]: Finished systemd-remount-fs.service. Feb 9 12:44:32.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.858776 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 12:44:32.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.867889 systemd[1]: Reached target network-pre.target. Feb 9 12:44:32.878141 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 12:44:32.887953 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 12:44:32.894648 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 12:44:32.895642 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 12:44:32.903077 systemd[1]: Starting systemd-journal-flush.service... Feb 9 12:44:32.906780 systemd-journald[1299]: Time spent on flushing to /var/log/journal/2cce2688db4345fabf8e0b252d8109a9 is 14.631ms for 1588 entries. Feb 9 12:44:32.906780 systemd-journald[1299]: System Journal (/var/log/journal/2cce2688db4345fabf8e0b252d8109a9) is 8.0M, max 195.6M, 187.6M free. Feb 9 12:44:32.955306 systemd-journald[1299]: Received client request to flush runtime journal. Feb 9 12:44:32.919494 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 12:44:32.919986 systemd[1]: Starting systemd-random-seed.service... Feb 9 12:44:32.938517 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 12:44:32.939063 systemd[1]: Starting systemd-sysctl.service... Feb 9 12:44:32.946053 systemd[1]: Starting systemd-sysusers.service... Feb 9 12:44:32.953037 systemd[1]: Starting systemd-udev-settle.service... Feb 9 12:44:32.960704 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 12:44:32.968575 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 12:44:32.976650 systemd[1]: Finished systemd-journal-flush.service. Feb 9 12:44:32.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.984665 systemd[1]: Finished systemd-random-seed.service. Feb 9 12:44:32.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:32.992658 systemd[1]: Finished systemd-sysctl.service. Feb 9 12:44:32.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:33.000639 systemd[1]: Finished systemd-sysusers.service. Feb 9 12:44:33.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:33.009562 systemd[1]: Reached target first-boot-complete.target. Feb 9 12:44:33.018193 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 12:44:33.026794 udevadm[1325]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 12:44:33.037451 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 12:44:33.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:33.223259 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 12:44:33.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:33.233330 systemd[1]: Starting systemd-udevd.service... Feb 9 12:44:33.245707 systemd-udevd[1332]: Using default interface naming scheme 'v252'. Feb 9 12:44:33.265737 systemd[1]: Started systemd-udevd.service. Feb 9 12:44:33.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:33.277206 systemd[1]: Found device dev-ttyS1.device. Feb 9 12:44:33.300331 systemd[1]: Starting systemd-networkd.service... Feb 9 12:44:33.317400 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 12:44:33.317460 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 12:44:33.317477 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 12:44:33.317492 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1401) Feb 9 12:44:33.336919 systemd[1]: dev-disk-by\x2dlabel-OEM.device was skipped because of an unmet condition check (ConditionPathExists=!/usr/.noupdate). Feb 9 12:44:33.340722 systemd[1]: Starting systemd-userdbd.service... Feb 9 12:44:33.375410 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 12:44:33.421398 kernel: ACPI: button: Power Button [PWRF] Feb 9 12:44:33.421434 kernel: IPMI message handler: version 39.2 Feb 9 12:44:33.315000 audit[1394]: AVC avc: denied { confidentiality } for pid=1394 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 12:44:33.315000 audit[1394]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f0104bfd010 a1=4d8bc a2=7f01068aebc5 a3=5 items=42 ppid=1332 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:33.315000 audit: CWD cwd="/" Feb 9 12:44:33.315000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=1 name=(null) inode=17564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=2 name=(null) inode=17564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=3 name=(null) inode=17565 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=4 name=(null) inode=17564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=5 name=(null) inode=17566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=6 name=(null) inode=17564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=7 name=(null) inode=17567 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=8 name=(null) inode=17567 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=9 name=(null) inode=17568 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=10 name=(null) inode=17567 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=11 name=(null) inode=17569 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=12 name=(null) inode=17567 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=13 name=(null) inode=17570 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=14 name=(null) inode=17567 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=15 name=(null) inode=17571 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=16 name=(null) inode=17567 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=17 name=(null) inode=17572 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=18 name=(null) inode=17564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=19 name=(null) inode=17573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=20 name=(null) inode=17573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=21 name=(null) inode=17574 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=22 name=(null) inode=17573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=23 name=(null) inode=17575 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=24 name=(null) inode=17573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=25 name=(null) inode=17576 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=26 name=(null) inode=17573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=27 name=(null) inode=17577 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=28 name=(null) inode=17573 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=29 name=(null) inode=17578 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=30 name=(null) inode=17564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=31 name=(null) inode=17579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=32 name=(null) inode=17579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=33 name=(null) inode=17580 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=34 name=(null) inode=17579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=35 name=(null) inode=17581 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=36 name=(null) inode=17579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=37 name=(null) inode=17582 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=38 name=(null) inode=17579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=39 name=(null) inode=17583 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=40 name=(null) inode=17579 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PATH item=41 name=(null) inode=17584 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:44:33.315000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 12:44:33.488210 systemd[1]: Started systemd-userdbd.service. Feb 9 12:44:33.507400 kernel: ipmi device interface Feb 9 12:44:33.539394 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 12:44:33.539519 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 12:44:33.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:33.602664 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 12:44:33.602780 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 12:44:33.626433 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 12:44:33.626523 kernel: ipmi_si: IPMI System Interface driver Feb 9 12:44:33.669807 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 12:44:33.669893 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 12:44:33.693136 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 12:44:33.736746 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 12:44:33.736842 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 12:44:33.813607 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 12:44:33.813790 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 12:44:33.813807 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 12:44:33.813818 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 12:44:33.891401 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Feb 9 12:44:33.891520 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 12:44:33.966085 systemd-networkd[1410]: bond0: netdev ready Feb 9 12:44:33.968167 systemd-networkd[1410]: lo: Link UP Feb 9 12:44:33.968170 systemd-networkd[1410]: lo: Gained carrier Feb 9 12:44:33.968636 systemd-networkd[1410]: Enumeration completed Feb 9 12:44:33.968704 systemd[1]: Started systemd-networkd.service. Feb 9 12:44:33.968911 systemd-networkd[1410]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 12:44:33.971964 systemd-networkd[1410]: enp2s0f1np1: Configuring with /etc/systemd/network/10-04:3f:72:d9:99:05.network. Feb 9 12:44:33.987715 kernel: intel_rapl_common: Found RAPL domain package Feb 9 12:44:33.987743 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Feb 9 12:44:33.987853 kernel: intel_rapl_common: Found RAPL domain core Feb 9 12:44:34.008393 kernel: intel_rapl_common: Found RAPL domain uncore Feb 9 12:44:34.008421 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 12:44:34.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:34.069396 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 12:44:34.096394 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 12:44:34.099641 systemd[1]: Finished systemd-udev-settle.service. Feb 9 12:44:34.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:34.109164 systemd[1]: Starting lvm2-activation-early.service... Feb 9 12:44:34.124179 lvm[1438]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 12:44:34.155800 systemd[1]: Finished lvm2-activation-early.service. Feb 9 12:44:34.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:34.164526 systemd[1]: Reached target cryptsetup.target. Feb 9 12:44:34.174041 systemd[1]: Starting lvm2-activation.service... Feb 9 12:44:34.176119 lvm[1440]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 12:44:34.207846 systemd[1]: Finished lvm2-activation.service. Feb 9 12:44:34.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:34.216512 systemd[1]: Reached target local-fs-pre.target. Feb 9 12:44:34.225469 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 12:44:34.225481 systemd[1]: Reached target local-fs.target. Feb 9 12:44:34.234476 systemd[1]: Reached target machines.target. Feb 9 12:44:34.244089 systemd[1]: Starting ldconfig.service... Feb 9 12:44:34.250851 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 12:44:34.250875 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 12:44:34.251491 systemd[1]: Starting systemd-boot-update.service... Feb 9 12:44:34.259890 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 12:44:34.271023 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 12:44:34.271163 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 12:44:34.271211 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 12:44:34.271814 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 12:44:34.272073 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1443 (bootctl) Feb 9 12:44:34.272712 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 12:44:34.292845 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 12:44:34.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:34.300896 systemd-tmpfiles[1447]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 12:44:34.309599 systemd-tmpfiles[1447]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 12:44:34.317740 systemd-tmpfiles[1447]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 12:44:34.543422 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 12:44:34.569248 systemd-networkd[1410]: enp2s0f0np0: Configuring with /etc/systemd/network/10-04:3f:72:d9:99:04.network. Feb 9 12:44:34.569395 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Feb 9 12:44:34.620429 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 12:44:34.734399 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 9 12:44:34.734600 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 12:44:34.757446 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Feb 9 12:44:34.779455 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 12:44:34.798406 systemd-fsck[1452]: fsck.fat 4.2 (2021-01-31) Feb 9 12:44:34.798406 systemd-fsck[1452]: /dev/sda1: 789 files, 115332/258078 clusters Feb 9 12:44:34.799050 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 12:44:34.799475 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 12:44:34.799646 systemd-networkd[1410]: bond0: Link UP Feb 9 12:44:34.799851 systemd-networkd[1410]: enp2s0f1np1: Link UP Feb 9 12:44:34.799973 systemd-networkd[1410]: enp2s0f1np1: Gained carrier Feb 9 12:44:34.800916 systemd-networkd[1410]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-04:3f:72:d9:99:04.network. Feb 9 12:44:34.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:34.816679 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 12:44:34.826393 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 12:44:34.826421 kernel: bond0: active interface up! Feb 9 12:44:34.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:34.854244 systemd[1]: Mounting boot.mount... Feb 9 12:44:34.865790 systemd[1]: Mounted boot.mount. Feb 9 12:44:34.881393 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 12:44:34.881431 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 12:44:34.920073 systemd[1]: Finished systemd-boot-update.service. Feb 9 12:44:34.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:34.953423 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 12:44:34.976424 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 12:44:34.980378 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 12:44:34.998394 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 12:44:35.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:35.016218 systemd[1]: Starting audit-rules.service... Feb 9 12:44:35.019396 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 12:44:35.035062 systemd[1]: Starting clean-ca-certificates.service... Feb 9 12:44:35.033000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 12:44:35.033000 audit[1476]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffebfc5c680 a2=420 a3=0 items=0 ppid=1461 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:35.033000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 12:44:35.035422 augenrules[1476]: No rules Feb 9 12:44:35.040394 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 12:44:35.057115 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 12:44:35.062393 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 12:44:35.065088 ldconfig[1442]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 12:44:35.079356 systemd[1]: Starting systemd-resolved.service... Feb 9 12:44:35.085396 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 12:44:35.101199 systemd[1]: Starting systemd-timesyncd.service... Feb 9 12:44:35.106462 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 12:44:35.106686 systemd-networkd[1410]: enp2s0f0np0: Link UP Feb 9 12:44:35.106849 systemd-networkd[1410]: bond0: Gained carrier Feb 9 12:44:35.106937 systemd-networkd[1410]: enp2s0f0np0: Gained carrier Feb 9 12:44:35.122024 systemd[1]: Starting systemd-update-utmp.service... Feb 9 12:44:35.127395 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 12:44:35.127424 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Feb 9 12:44:35.157801 systemd[1]: Finished ldconfig.service. Feb 9 12:44:35.159942 systemd-networkd[1410]: enp2s0f1np1: Link DOWN Feb 9 12:44:35.159945 systemd-networkd[1410]: enp2s0f1np1: Lost carrier Feb 9 12:44:35.160458 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 12:44:35.167647 systemd[1]: Finished audit-rules.service. Feb 9 12:44:35.175628 systemd[1]: Finished clean-ca-certificates.service. Feb 9 12:44:35.183632 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 12:44:35.195249 systemd[1]: Starting systemd-update-done.service... Feb 9 12:44:35.202473 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 12:44:35.202939 systemd[1]: Finished systemd-update-done.service. Feb 9 12:44:35.213108 systemd[1]: Finished systemd-update-utmp.service. Feb 9 12:44:35.226831 systemd[1]: Started systemd-timesyncd.service. Feb 9 12:44:35.228396 systemd-resolved[1487]: Positive Trust Anchors: Feb 9 12:44:35.228402 systemd-resolved[1487]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 12:44:35.228421 systemd-resolved[1487]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 12:44:35.232521 systemd-resolved[1487]: Using system hostname 'ci-3510.3.2-a-524ff09451'. Feb 9 12:44:35.235574 systemd[1]: Reached target time-set.target. Feb 9 12:44:35.346451 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 12:44:35.364972 systemd-networkd[1410]: enp2s0f1np1: Link UP Feb 9 12:44:35.365429 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Feb 9 12:44:35.366523 systemd-networkd[1410]: enp2s0f1np1: Gained carrier Feb 9 12:44:35.366910 systemd[1]: Started systemd-resolved.service. Feb 9 12:44:35.379793 systemd[1]: Reached target network.target. Feb 9 12:44:35.389440 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Feb 9 12:44:35.406508 systemd[1]: Reached target nss-lookup.target. Feb 9 12:44:35.409445 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 12:44:35.417432 systemd[1]: Reached target sysinit.target. Feb 9 12:44:35.426465 systemd[1]: Started motdgen.path. Feb 9 12:44:35.434437 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 12:44:35.443491 systemd[1]: Started logrotate.timer. Feb 9 12:44:35.451457 systemd[1]: Started mdadm.timer. Feb 9 12:44:35.458424 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 12:44:35.467420 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 12:44:35.467433 systemd[1]: Reached target paths.target. Feb 9 12:44:35.475418 systemd[1]: Reached target timers.target. Feb 9 12:44:35.483547 systemd[1]: Listening on dbus.socket. Feb 9 12:44:35.492143 systemd[1]: Starting docker.socket... Feb 9 12:44:35.499246 systemd[1]: Listening on sshd.socket. Feb 9 12:44:35.506537 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 12:44:35.506725 systemd[1]: Listening on docker.socket. Feb 9 12:44:35.513509 systemd[1]: Reached target sockets.target. Feb 9 12:44:35.521490 systemd[1]: Reached target basic.target. Feb 9 12:44:35.528521 systemd[1]: System is tainted: cgroupsv1 Feb 9 12:44:35.528545 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 12:44:35.528557 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 12:44:35.529072 systemd[1]: Starting containerd.service... Feb 9 12:44:35.535912 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 12:44:35.545039 systemd[1]: Starting coreos-metadata.service... Feb 9 12:44:35.552006 systemd[1]: Starting dbus.service... Feb 9 12:44:35.558981 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 12:44:35.563394 jq[1505]: false Feb 9 12:44:35.565600 coreos-metadata[1498]: Feb 09 12:44:35.565 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 12:44:35.567147 systemd[1]: Starting extend-filesystems.service... Feb 9 12:44:35.570561 dbus-daemon[1504]: [system] SELinux support is enabled Feb 9 12:44:35.574471 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 12:44:35.574866 coreos-metadata[1501]: Feb 09 12:44:35.574 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 12:44:35.575138 extend-filesystems[1508]: Found sda Feb 9 12:44:35.575138 extend-filesystems[1508]: Found sda1 Feb 9 12:44:35.618505 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 9 12:44:35.575132 systemd[1]: Starting motdgen.service... Feb 9 12:44:35.618595 extend-filesystems[1508]: Found sda2 Feb 9 12:44:35.618595 extend-filesystems[1508]: Found sda3 Feb 9 12:44:35.618595 extend-filesystems[1508]: Found usr Feb 9 12:44:35.618595 extend-filesystems[1508]: Found sda4 Feb 9 12:44:35.618595 extend-filesystems[1508]: Found sda6 Feb 9 12:44:35.618595 extend-filesystems[1508]: Found sda7 Feb 9 12:44:35.618595 extend-filesystems[1508]: Found sda9 Feb 9 12:44:35.618595 extend-filesystems[1508]: Checking size of /dev/sda9 Feb 9 12:44:35.618595 extend-filesystems[1508]: Resized partition /dev/sda9 Feb 9 12:44:35.583235 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 12:44:35.722550 extend-filesystems[1523]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 12:44:35.612124 systemd[1]: Starting prepare-critools.service... Feb 9 12:44:35.626993 systemd[1]: Starting prepare-helm.service... Feb 9 12:44:35.641929 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 12:44:35.660913 systemd[1]: Starting sshd-keygen.service... Feb 9 12:44:35.687371 systemd[1]: Starting systemd-logind.service... Feb 9 12:44:35.700422 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 12:44:35.700979 systemd[1]: Starting tcsd.service... Feb 9 12:44:35.710638 systemd-logind[1541]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 12:44:35.739176 jq[1544]: true Feb 9 12:44:35.710648 systemd-logind[1541]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 12:44:35.710657 systemd-logind[1541]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 12:44:35.710823 systemd-logind[1541]: New seat seat0. Feb 9 12:44:35.714067 systemd[1]: Starting update-engine.service... Feb 9 12:44:35.731083 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 12:44:35.747773 systemd[1]: Started dbus.service. Feb 9 12:44:35.756239 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 12:44:35.756361 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 12:44:35.756543 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 12:44:35.756647 systemd[1]: Finished motdgen.service. Feb 9 12:44:35.757435 update_engine[1543]: I0209 12:44:35.756953 1543 main.cc:92] Flatcar Update Engine starting Feb 9 12:44:35.760152 update_engine[1543]: I0209 12:44:35.760143 1543 update_check_scheduler.cc:74] Next update check in 7m45s Feb 9 12:44:35.764451 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 12:44:35.764567 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 12:44:35.769142 tar[1548]: ./ Feb 9 12:44:35.769142 tar[1548]: ./macvlan Feb 9 12:44:35.775003 jq[1554]: true Feb 9 12:44:35.775635 tar[1550]: linux-amd64/helm Feb 9 12:44:35.776201 dbus-daemon[1504]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 12:44:35.777145 tar[1549]: crictl Feb 9 12:44:35.780638 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 12:44:35.780817 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 12:44:35.786319 env[1555]: time="2024-02-09T12:44:35.786289591Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 12:44:35.787508 systemd[1]: Started systemd-logind.service. Feb 9 12:44:35.790822 tar[1548]: ./static Feb 9 12:44:35.794851 env[1555]: time="2024-02-09T12:44:35.794824586Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 12:44:35.794907 env[1555]: time="2024-02-09T12:44:35.794891096Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 12:44:35.795502 env[1555]: time="2024-02-09T12:44:35.795459062Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 12:44:35.795502 env[1555]: time="2024-02-09T12:44:35.795472316Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 12:44:35.795504 systemd[1]: Started update-engine.service. Feb 9 12:44:35.797534 env[1555]: time="2024-02-09T12:44:35.797494340Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 12:44:35.797534 env[1555]: time="2024-02-09T12:44:35.797504905Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 12:44:35.797534 env[1555]: time="2024-02-09T12:44:35.797512787Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 12:44:35.797534 env[1555]: time="2024-02-09T12:44:35.797518227Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 12:44:35.797633 env[1555]: time="2024-02-09T12:44:35.797567845Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 12:44:35.797766 env[1555]: time="2024-02-09T12:44:35.797725974Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 12:44:35.797847 env[1555]: time="2024-02-09T12:44:35.797810566Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 12:44:35.797847 env[1555]: time="2024-02-09T12:44:35.797820551Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 12:44:35.799710 env[1555]: time="2024-02-09T12:44:35.799696757Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 12:44:35.799710 env[1555]: time="2024-02-09T12:44:35.799709200Z" level=info msg="metadata content store policy set" policy=shared Feb 9 12:44:35.804298 bash[1580]: Updated "/home/core/.ssh/authorized_keys" Feb 9 12:44:35.805263 systemd[1]: Started locksmithd.service. Feb 9 12:44:35.808832 env[1555]: time="2024-02-09T12:44:35.808792380Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 12:44:35.808832 env[1555]: time="2024-02-09T12:44:35.808815585Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 12:44:35.808832 env[1555]: time="2024-02-09T12:44:35.808826601Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 12:44:35.808907 env[1555]: time="2024-02-09T12:44:35.808852689Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 12:44:35.808907 env[1555]: time="2024-02-09T12:44:35.808861660Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 12:44:35.808907 env[1555]: time="2024-02-09T12:44:35.808870146Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 12:44:35.808907 env[1555]: time="2024-02-09T12:44:35.808877005Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 12:44:35.808907 env[1555]: time="2024-02-09T12:44:35.808885451Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 12:44:35.808907 env[1555]: time="2024-02-09T12:44:35.808892302Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 12:44:35.808907 env[1555]: time="2024-02-09T12:44:35.808899648Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 12:44:35.808907 env[1555]: time="2024-02-09T12:44:35.808906390Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 12:44:35.809025 env[1555]: time="2024-02-09T12:44:35.808913206Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 12:44:35.809025 env[1555]: time="2024-02-09T12:44:35.808969534Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 12:44:35.809025 env[1555]: time="2024-02-09T12:44:35.809017395Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 12:44:35.809228 env[1555]: time="2024-02-09T12:44:35.809192861Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 12:44:35.809228 env[1555]: time="2024-02-09T12:44:35.809208272Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 12:44:35.809228 env[1555]: time="2024-02-09T12:44:35.809215775Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 12:44:35.809280 env[1555]: time="2024-02-09T12:44:35.809243226Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 12:44:35.809280 env[1555]: time="2024-02-09T12:44:35.809251228Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 12:44:35.809280 env[1555]: time="2024-02-09T12:44:35.809258228Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 12:44:35.809280 env[1555]: time="2024-02-09T12:44:35.809264196Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 12:44:35.809280 env[1555]: time="2024-02-09T12:44:35.809270848Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 12:44:35.809280 env[1555]: time="2024-02-09T12:44:35.809277428Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 12:44:35.809367 env[1555]: time="2024-02-09T12:44:35.809283753Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 12:44:35.809367 env[1555]: time="2024-02-09T12:44:35.809290252Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 12:44:35.809367 env[1555]: time="2024-02-09T12:44:35.809297166Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 12:44:35.809367 env[1555]: time="2024-02-09T12:44:35.809356682Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 12:44:35.809367 env[1555]: time="2024-02-09T12:44:35.809365523Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 12:44:35.809458 env[1555]: time="2024-02-09T12:44:35.809372139Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 12:44:35.809458 env[1555]: time="2024-02-09T12:44:35.809382317Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 12:44:35.809458 env[1555]: time="2024-02-09T12:44:35.809397489Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 12:44:35.809458 env[1555]: time="2024-02-09T12:44:35.809405108Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 12:44:35.809458 env[1555]: time="2024-02-09T12:44:35.809414883Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 12:44:35.809458 env[1555]: time="2024-02-09T12:44:35.809436432Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 12:44:35.809598 env[1555]: time="2024-02-09T12:44:35.809546079Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 12:44:35.809598 env[1555]: time="2024-02-09T12:44:35.809577621Z" level=info msg="Connect containerd service" Feb 9 12:44:35.809598 env[1555]: time="2024-02-09T12:44:35.809596594Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 12:44:35.811752 env[1555]: time="2024-02-09T12:44:35.810017434Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 12:44:35.811752 env[1555]: time="2024-02-09T12:44:35.810156583Z" level=info msg="Start subscribing containerd event" Feb 9 12:44:35.811752 env[1555]: time="2024-02-09T12:44:35.810292110Z" level=info msg="Start recovering state" Feb 9 12:44:35.811752 env[1555]: time="2024-02-09T12:44:35.810340896Z" level=info msg="Start event monitor" Feb 9 12:44:35.811752 env[1555]: time="2024-02-09T12:44:35.810351637Z" level=info msg="Start snapshots syncer" Feb 9 12:44:35.811752 env[1555]: time="2024-02-09T12:44:35.810359983Z" level=info msg="Start cni network conf syncer for default" Feb 9 12:44:35.811752 env[1555]: time="2024-02-09T12:44:35.810366601Z" level=info msg="Start streaming server" Feb 9 12:44:35.811752 env[1555]: time="2024-02-09T12:44:35.810395649Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 12:44:35.811752 env[1555]: time="2024-02-09T12:44:35.810433598Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 12:44:35.811752 env[1555]: time="2024-02-09T12:44:35.810465232Z" level=info msg="containerd successfully booted in 0.024636s" Feb 9 12:44:35.811557 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 12:44:35.811654 systemd[1]: Reached target system-config.target. Feb 9 12:44:35.815170 tar[1548]: ./vlan Feb 9 12:44:35.819516 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 12:44:35.819619 systemd[1]: Reached target user-config.target. Feb 9 12:44:35.829270 systemd[1]: Started containerd.service. Feb 9 12:44:35.835279 tar[1548]: ./portmap Feb 9 12:44:35.836758 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 12:44:35.854407 tar[1548]: ./host-local Feb 9 12:44:35.865715 locksmithd[1592]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 12:44:35.871249 tar[1548]: ./vrf Feb 9 12:44:35.889329 tar[1548]: ./bridge Feb 9 12:44:35.911000 tar[1548]: ./tuning Feb 9 12:44:35.928316 tar[1548]: ./firewall Feb 9 12:44:35.950746 tar[1548]: ./host-device Feb 9 12:44:35.970283 tar[1548]: ./sbr Feb 9 12:44:35.988199 tar[1548]: ./loopback Feb 9 12:44:36.005173 tar[1548]: ./dhcp Feb 9 12:44:36.030432 tar[1550]: linux-amd64/LICENSE Feb 9 12:44:36.030514 tar[1550]: linux-amd64/README.md Feb 9 12:44:36.033002 systemd[1]: Finished prepare-helm.service. Feb 9 12:44:36.044350 systemd[1]: Finished prepare-critools.service. Feb 9 12:44:36.054431 tar[1548]: ./ptp Feb 9 12:44:36.075514 tar[1548]: ./ipvlan Feb 9 12:44:36.095889 tar[1548]: ./bandwidth Feb 9 12:44:36.120691 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 12:44:36.132439 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 9 12:44:36.160204 extend-filesystems[1523]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 12:44:36.160204 extend-filesystems[1523]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 12:44:36.160204 extend-filesystems[1523]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 9 12:44:36.197498 extend-filesystems[1508]: Resized filesystem in /dev/sda9 Feb 9 12:44:36.197498 extend-filesystems[1508]: Found sdb Feb 9 12:44:36.160693 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 12:44:36.160811 systemd[1]: Finished extend-filesystems.service. Feb 9 12:44:36.163510 systemd-networkd[1410]: bond0: Gained IPv6LL Feb 9 12:44:36.318044 sshd_keygen[1540]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 12:44:36.329500 systemd[1]: Finished sshd-keygen.service. Feb 9 12:44:36.337508 systemd[1]: Starting issuegen.service... Feb 9 12:44:36.344737 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 12:44:36.344839 systemd[1]: Finished issuegen.service. Feb 9 12:44:36.353251 systemd[1]: Starting systemd-user-sessions.service... Feb 9 12:44:36.361756 systemd[1]: Finished systemd-user-sessions.service. Feb 9 12:44:36.370129 systemd[1]: Started getty@tty1.service. Feb 9 12:44:36.377085 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 12:44:36.386653 systemd[1]: Reached target getty.target. Feb 9 12:44:37.649448 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 12:44:40.819224 coreos-metadata[1501]: Feb 09 12:44:40.819 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 12:44:40.819498 coreos-metadata[1498]: Feb 09 12:44:40.819 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 12:44:41.391960 login[1630]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 12:44:41.399230 systemd-logind[1541]: New session 1 of user core. Feb 9 12:44:41.399855 systemd[1]: Created slice user-500.slice. Feb 9 12:44:41.400350 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 12:44:41.402519 login[1629]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 12:44:41.404768 systemd-logind[1541]: New session 2 of user core. Feb 9 12:44:41.406825 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 12:44:41.407511 systemd[1]: Starting user@500.service... Feb 9 12:44:41.409864 (systemd)[1642]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:44:41.474573 systemd[1642]: Queued start job for default target default.target. Feb 9 12:44:41.474670 systemd[1642]: Reached target paths.target. Feb 9 12:44:41.474681 systemd[1642]: Reached target sockets.target. Feb 9 12:44:41.474689 systemd[1642]: Reached target timers.target. Feb 9 12:44:41.474696 systemd[1642]: Reached target basic.target. Feb 9 12:44:41.474714 systemd[1642]: Reached target default.target. Feb 9 12:44:41.474727 systemd[1642]: Startup finished in 61ms. Feb 9 12:44:41.474786 systemd[1]: Started user@500.service. Feb 9 12:44:41.475288 systemd[1]: Started session-1.scope. Feb 9 12:44:41.475588 systemd[1]: Started session-2.scope. Feb 9 12:44:41.819804 coreos-metadata[1501]: Feb 09 12:44:41.819 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 12:44:41.820637 coreos-metadata[1498]: Feb 09 12:44:41.819 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 12:44:41.824077 coreos-metadata[1498]: Feb 09 12:44:41.823 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 12:44:41.827215 coreos-metadata[1501]: Feb 09 12:44:41.827 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 12:44:42.914441 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Feb 9 12:44:42.914622 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 9 12:44:43.824456 coreos-metadata[1498]: Feb 09 12:44:43.824 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 9 12:44:43.827369 coreos-metadata[1501]: Feb 09 12:44:43.827 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 9 12:44:43.849722 coreos-metadata[1498]: Feb 09 12:44:43.849 INFO Fetch successful Feb 9 12:44:43.851694 coreos-metadata[1501]: Feb 09 12:44:43.851 INFO Fetch successful Feb 9 12:44:43.875954 systemd[1]: Finished coreos-metadata.service. Feb 9 12:44:43.876323 unknown[1498]: wrote ssh authorized keys file for user: core Feb 9 12:44:43.877146 systemd[1]: Started packet-phone-home.service. Feb 9 12:44:43.883020 curl[1670]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 12:44:43.883205 curl[1670]: Dload Upload Total Spent Left Speed Feb 9 12:44:43.887906 update-ssh-keys[1672]: Updated "/home/core/.ssh/authorized_keys" Feb 9 12:44:43.888195 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 12:44:43.888425 systemd[1]: Reached target multi-user.target. Feb 9 12:44:43.889172 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 12:44:43.892804 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 12:44:43.892907 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 12:44:43.893056 systemd[1]: Startup finished in 21.785s (kernel) + 15.283s (userspace) = 37.068s. Feb 9 12:44:44.089894 curl[1670]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 12:44:44.092308 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 12:44:44.482010 systemd[1]: Created slice system-sshd.slice. Feb 9 12:44:44.482763 systemd[1]: Started sshd@0-139.178.91.169:22-147.75.109.163:34936.service. Feb 9 12:44:44.527438 sshd[1678]: Accepted publickey for core from 147.75.109.163 port 34936 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:44:44.528081 sshd[1678]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:44:44.530334 systemd-logind[1541]: New session 3 of user core. Feb 9 12:44:44.530890 systemd[1]: Started session-3.scope. Feb 9 12:44:44.578415 systemd[1]: Started sshd@1-139.178.91.169:22-147.75.109.163:37768.service. Feb 9 12:44:44.606292 sshd[1683]: Accepted publickey for core from 147.75.109.163 port 37768 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:44:44.607024 sshd[1683]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:44:44.609378 systemd-logind[1541]: New session 4 of user core. Feb 9 12:44:44.609974 systemd[1]: Started session-4.scope. Feb 9 12:44:44.661009 sshd[1683]: pam_unix(sshd:session): session closed for user core Feb 9 12:44:44.662392 systemd[1]: Started sshd@2-139.178.91.169:22-147.75.109.163:37776.service. Feb 9 12:44:44.662767 systemd[1]: sshd@1-139.178.91.169:22-147.75.109.163:37768.service: Deactivated successfully. Feb 9 12:44:44.663207 systemd-logind[1541]: Session 4 logged out. Waiting for processes to exit. Feb 9 12:44:44.663260 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 12:44:44.663809 systemd-logind[1541]: Removed session 4. Feb 9 12:44:44.690952 sshd[1689]: Accepted publickey for core from 147.75.109.163 port 37776 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:44:44.691820 sshd[1689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:44:44.694754 systemd-logind[1541]: New session 5 of user core. Feb 9 12:44:44.695477 systemd[1]: Started session-5.scope. Feb 9 12:44:44.747272 sshd[1689]: pam_unix(sshd:session): session closed for user core Feb 9 12:44:44.748811 systemd[1]: Started sshd@3-139.178.91.169:22-147.75.109.163:37784.service. Feb 9 12:44:44.749114 systemd[1]: sshd@2-139.178.91.169:22-147.75.109.163:37776.service: Deactivated successfully. Feb 9 12:44:44.749600 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 12:44:44.749639 systemd-logind[1541]: Session 5 logged out. Waiting for processes to exit. Feb 9 12:44:44.750120 systemd-logind[1541]: Removed session 5. Feb 9 12:44:44.786698 sshd[1696]: Accepted publickey for core from 147.75.109.163 port 37784 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:44:44.787589 sshd[1696]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:44:44.790571 systemd-logind[1541]: New session 6 of user core. Feb 9 12:44:44.791358 systemd[1]: Started session-6.scope. Feb 9 12:44:44.856187 sshd[1696]: pam_unix(sshd:session): session closed for user core Feb 9 12:44:44.862645 systemd[1]: Started sshd@4-139.178.91.169:22-147.75.109.163:37792.service. Feb 9 12:44:44.864318 systemd[1]: sshd@3-139.178.91.169:22-147.75.109.163:37784.service: Deactivated successfully. Feb 9 12:44:44.866893 systemd-logind[1541]: Session 6 logged out. Waiting for processes to exit. Feb 9 12:44:44.867068 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 12:44:44.868239 systemd-logind[1541]: Removed session 6. Feb 9 12:44:44.894256 sshd[1703]: Accepted publickey for core from 147.75.109.163 port 37792 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:44:44.894941 sshd[1703]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:44:44.897288 systemd-logind[1541]: New session 7 of user core. Feb 9 12:44:44.897862 systemd[1]: Started session-7.scope. Feb 9 12:44:44.963605 sudo[1708]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 12:44:44.964063 sudo[1708]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 12:44:44.985865 dbus-daemon[1504]: \xd0\xfd}g\xd2U: received setenforce notice (enforcing=-1132435888) Feb 9 12:44:44.990884 sudo[1708]: pam_unix(sudo:session): session closed for user root Feb 9 12:44:44.996192 sshd[1703]: pam_unix(sshd:session): session closed for user core Feb 9 12:44:45.005113 systemd[1]: Started sshd@5-139.178.91.169:22-147.75.109.163:37804.service. Feb 9 12:44:45.007331 systemd[1]: sshd@4-139.178.91.169:22-147.75.109.163:37792.service: Deactivated successfully. Feb 9 12:44:45.010070 systemd-logind[1541]: Session 7 logged out. Waiting for processes to exit. Feb 9 12:44:45.010309 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 12:44:45.012953 systemd-logind[1541]: Removed session 7. Feb 9 12:44:45.093180 sshd[1710]: Accepted publickey for core from 147.75.109.163 port 37804 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:44:45.094326 sshd[1710]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:44:45.097663 systemd-logind[1541]: New session 8 of user core. Feb 9 12:44:45.098691 systemd[1]: Started session-8.scope. Feb 9 12:44:45.153961 sudo[1718]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 12:44:45.154070 sudo[1718]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 12:44:45.155896 sudo[1718]: pam_unix(sudo:session): session closed for user root Feb 9 12:44:45.158160 sudo[1717]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 12:44:45.158268 sudo[1717]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 12:44:45.163789 systemd[1]: Stopping audit-rules.service... Feb 9 12:44:45.163000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 12:44:45.164737 auditctl[1721]: No rules Feb 9 12:44:45.164894 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 12:44:45.165024 systemd[1]: Stopped audit-rules.service. Feb 9 12:44:45.165950 systemd[1]: Starting audit-rules.service... Feb 9 12:44:45.170087 kernel: kauditd_printk_skb: 78 callbacks suppressed Feb 9 12:44:45.170121 kernel: audit: type=1305 audit(1707482685.163:133): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 12:44:45.177233 augenrules[1739]: No rules Feb 9 12:44:45.177628 systemd[1]: Finished audit-rules.service. Feb 9 12:44:45.178175 sudo[1717]: pam_unix(sudo:session): session closed for user root Feb 9 12:44:45.179144 sshd[1710]: pam_unix(sshd:session): session closed for user core Feb 9 12:44:45.180685 systemd[1]: Started sshd@6-139.178.91.169:22-147.75.109.163:37810.service. Feb 9 12:44:45.181458 systemd[1]: sshd@5-139.178.91.169:22-147.75.109.163:37804.service: Deactivated successfully. Feb 9 12:44:45.182045 systemd-logind[1541]: Session 8 logged out. Waiting for processes to exit. Feb 9 12:44:45.182088 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 12:44:45.182784 systemd-logind[1541]: Removed session 8. Feb 9 12:44:45.163000 audit[1721]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeb072a0a0 a2=420 a3=0 items=0 ppid=1 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:45.216673 kernel: audit: type=1300 audit(1707482685.163:133): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeb072a0a0 a2=420 a3=0 items=0 ppid=1 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:45.216743 kernel: audit: type=1327 audit(1707482685.163:133): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 12:44:45.163000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 12:44:45.226186 kernel: audit: type=1131 audit(1707482685.163:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:45.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:45.247664 sshd[1744]: Accepted publickey for core from 147.75.109.163 port 37810 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:44:45.248686 kernel: audit: type=1130 audit(1707482685.176:135): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:45.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:45.248865 sshd[1744]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:44:45.251288 systemd-logind[1541]: New session 9 of user core. Feb 9 12:44:45.251837 systemd[1]: Started session-9.scope. Feb 9 12:44:45.271169 kernel: audit: type=1106 audit(1707482685.176:136): pid=1717 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:44:45.176000 audit[1717]: USER_END pid=1717 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:44:45.297172 kernel: audit: type=1104 audit(1707482685.176:137): pid=1717 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:44:45.176000 audit[1717]: CRED_DISP pid=1717 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:44:45.299419 sudo[1750]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 12:44:45.299527 sudo[1750]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 12:44:45.179000 audit[1710]: USER_END pid=1710 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:44:45.352880 kernel: audit: type=1106 audit(1707482685.179:138): pid=1710 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:44:45.352903 kernel: audit: type=1104 audit(1707482685.179:139): pid=1710 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:44:45.179000 audit[1710]: CRED_DISP pid=1710 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:44:45.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.91.169:22-147.75.109.163:37810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:45.404405 kernel: audit: type=1130 audit(1707482685.179:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.91.169:22-147.75.109.163:37810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:45.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.91.169:22-147.75.109.163:37804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:45.246000 audit[1744]: USER_ACCT pid=1744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:44:45.247000 audit[1744]: CRED_ACQ pid=1744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:44:45.247000 audit[1744]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebe644540 a2=3 a3=0 items=0 ppid=1 pid=1744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:45.247000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:44:45.253000 audit[1744]: USER_START pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:44:45.254000 audit[1749]: CRED_ACQ pid=1749 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:44:45.297000 audit[1750]: USER_ACCT pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:44:45.298000 audit[1750]: CRED_REFR pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:44:45.299000 audit[1750]: USER_START pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:44:49.893696 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 12:44:49.898006 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 12:44:49.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:49.898199 systemd[1]: Reached target network-online.target. Feb 9 12:44:49.898940 systemd[1]: Starting docker.service... Feb 9 12:44:49.920584 env[1773]: time="2024-02-09T12:44:49.920527429Z" level=info msg="Starting up" Feb 9 12:44:49.921228 env[1773]: time="2024-02-09T12:44:49.921185830Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 12:44:49.921228 env[1773]: time="2024-02-09T12:44:49.921194829Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 12:44:49.921275 env[1773]: time="2024-02-09T12:44:49.921205707Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 12:44:49.921275 env[1773]: time="2024-02-09T12:44:49.921240416Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 12:44:49.922048 env[1773]: time="2024-02-09T12:44:49.922009537Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 12:44:49.922048 env[1773]: time="2024-02-09T12:44:49.922019147Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 12:44:49.922048 env[1773]: time="2024-02-09T12:44:49.922028594Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 12:44:49.922048 env[1773]: time="2024-02-09T12:44:49.922034465Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 12:44:50.322148 env[1773]: time="2024-02-09T12:44:50.322070985Z" level=warning msg="Your kernel does not support cgroup blkio weight" Feb 9 12:44:50.322148 env[1773]: time="2024-02-09T12:44:50.322085482Z" level=warning msg="Your kernel does not support cgroup blkio weight_device" Feb 9 12:44:50.322287 env[1773]: time="2024-02-09T12:44:50.322216148Z" level=info msg="Loading containers: start." Feb 9 12:44:50.359000 audit[1816]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:50.366742 kernel: kauditd_printk_skb: 12 callbacks suppressed Feb 9 12:44:50.366778 kernel: audit: type=1325 audit(1707482690.359:151): table=nat:2 family=2 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:50.359000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcd9571b80 a2=0 a3=7ffcd9571b6c items=0 ppid=1773 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:50.481952 kernel: audit: type=1300 audit(1707482690.359:151): arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcd9571b80 a2=0 a3=7ffcd9571b6c items=0 ppid=1773 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:50.481981 kernel: audit: type=1327 audit(1707482690.359:151): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 12:44:50.359000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 12:44:50.360000 audit[1818]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:50.581828 kernel: audit: type=1325 audit(1707482690.360:152): table=filter:3 family=2 entries=2 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:50.581857 kernel: audit: type=1300 audit(1707482690.360:152): arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdb2e78090 a2=0 a3=7ffdb2e7807c items=0 ppid=1773 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:50.360000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdb2e78090 a2=0 a3=7ffdb2e7807c items=0 ppid=1773 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:50.671664 kernel: audit: type=1327 audit(1707482690.360:152): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 12:44:50.360000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 12:44:50.725806 kernel: audit: type=1325 audit(1707482690.361:153): table=filter:4 family=2 entries=1 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:50.361000 audit[1820]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:50.782476 kernel: audit: type=1300 audit(1707482690.361:153): arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffb348c3a0 a2=0 a3=7fffb348c38c items=0 ppid=1773 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:50.361000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffb348c3a0 a2=0 a3=7fffb348c38c items=0 ppid=1773 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:50.878098 kernel: audit: type=1327 audit(1707482690.361:153): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 12:44:50.361000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 12:44:50.938095 kernel: audit: type=1325 audit(1707482690.362:154): table=filter:5 family=2 entries=1 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:50.362000 audit[1822]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:50.362000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffebabc14e0 a2=0 a3=7ffebabc14cc items=0 ppid=1773 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:50.362000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 12:44:50.363000 audit[1824]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:50.363000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed26a2cc0 a2=0 a3=7ffed26a2cac items=0 ppid=1773 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:50.363000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 12:44:51.006000 audit[1829]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.006000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc83f2f640 a2=0 a3=7ffc83f2f62c items=0 ppid=1773 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.006000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 12:44:51.008000 audit[1831]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.008000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd90cbc970 a2=0 a3=7ffd90cbc95c items=0 ppid=1773 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.008000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 12:44:51.009000 audit[1833]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.009000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc5278cae0 a2=0 a3=7ffc5278cacc items=0 ppid=1773 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 12:44:51.010000 audit[1835]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.010000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffdb5d2e020 a2=0 a3=7ffdb5d2e00c items=0 ppid=1773 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.010000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 12:44:51.013000 audit[1839]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.013000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffeafc74710 a2=0 a3=7ffeafc746fc items=0 ppid=1773 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.013000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 12:44:51.014000 audit[1840]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.014000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffeac1618a0 a2=0 a3=7ffeac16188c items=0 ppid=1773 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.014000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 12:44:51.046445 kernel: Initializing XFRM netlink socket Feb 9 12:44:51.068835 env[1773]: time="2024-02-09T12:44:51.068792011Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 12:44:51.069373 systemd-timesyncd[1488]: Network configuration changed, trying to establish connection. Feb 9 12:44:51.078000 audit[1848]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1848 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.078000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffdb3390740 a2=0 a3=7ffdb339072c items=0 ppid=1773 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.078000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 12:44:51.100000 audit[1851]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.100000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe58b52f80 a2=0 a3=7ffe58b52f6c items=0 ppid=1773 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.100000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 12:44:51.101000 audit[1854]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1854 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.101000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff3ea220c0 a2=0 a3=7fff3ea220ac items=0 ppid=1773 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 12:44:51.102000 audit[1856]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.102000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe45cb7300 a2=0 a3=7ffe45cb72ec items=0 ppid=1773 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 12:44:51.103000 audit[1858]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.103000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffff0590a80 a2=0 a3=7ffff0590a6c items=0 ppid=1773 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.103000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 12:44:51.105000 audit[1860]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.105000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe9ad4ba00 a2=0 a3=7ffe9ad4b9ec items=0 ppid=1773 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.105000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 12:44:51.106000 audit[1862]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.106000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffec7f1fcb0 a2=0 a3=7ffec7f1fc9c items=0 ppid=1773 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 12:44:51.111000 audit[1865]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.111000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe56ab30a0 a2=0 a3=7ffe56ab308c items=0 ppid=1773 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.111000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 12:44:51.113000 audit[1867]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.113000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffeb93bb600 a2=0 a3=7ffeb93bb5ec items=0 ppid=1773 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.113000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 12:44:51.114000 audit[1869]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.114000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc5e2144c0 a2=0 a3=7ffc5e2144ac items=0 ppid=1773 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.114000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 12:44:51.115000 audit[1871]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.115000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffefb091f50 a2=0 a3=7ffefb091f3c items=0 ppid=1773 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.115000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 12:44:51.117494 systemd-networkd[1410]: docker0: Link UP Feb 9 12:44:51.120000 audit[1875]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.120000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdd7c8f830 a2=0 a3=7ffdd7c8f81c items=0 ppid=1773 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.120000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 12:44:51.121000 audit[1876]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:44:51.121000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcdaac6ec0 a2=0 a3=7ffcdaac6eac items=0 ppid=1773 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:51.121000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 12:44:51.123130 env[1773]: time="2024-02-09T12:44:51.123088221Z" level=info msg="Loading containers: done." Feb 9 12:44:51.131851 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1536206504-merged.mount: Deactivated successfully. Feb 9 12:44:51.133015 env[1773]: time="2024-02-09T12:44:51.132961843Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 12:44:51.133151 env[1773]: time="2024-02-09T12:44:51.133104642Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 12:44:51.133215 env[1773]: time="2024-02-09T12:44:51.133185517Z" level=info msg="Daemon has completed initialization" Feb 9 12:44:51.134564 systemd-timesyncd[1488]: Contacted time server [2605:6400:84e1::123]:123 (2.flatcar.pool.ntp.org). Feb 9 12:44:51.134625 systemd-timesyncd[1488]: Initial clock synchronization to Fri 2024-02-09 12:44:51.247216 UTC. Feb 9 12:44:51.144097 systemd[1]: Started docker.service. Feb 9 12:44:51.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:51.148254 env[1773]: time="2024-02-09T12:44:51.148190567Z" level=info msg="API listen on /run/docker.sock" Feb 9 12:44:51.171463 systemd[1]: Reloading. Feb 9 12:44:51.220030 /usr/lib/systemd/system-generators/torcx-generator[1926]: time="2024-02-09T12:44:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 12:44:51.220046 /usr/lib/systemd/system-generators/torcx-generator[1926]: time="2024-02-09T12:44:51Z" level=info msg="torcx already run" Feb 9 12:44:51.282224 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 12:44:51.282234 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 12:44:51.296955 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 12:44:51.349712 systemd[1]: Started kubelet.service. Feb 9 12:44:51.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:51.373207 kubelet[1991]: E0209 12:44:51.373178 1991 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 12:44:51.374457 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 12:44:51.374553 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 12:44:51.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 12:44:52.106997 env[1555]: time="2024-02-09T12:44:52.106941597Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 12:44:52.908661 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2969717773.mount: Deactivated successfully. Feb 9 12:44:55.171229 env[1555]: time="2024-02-09T12:44:55.171173243Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:44:55.171781 env[1555]: time="2024-02-09T12:44:55.171740689Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:44:55.173093 env[1555]: time="2024-02-09T12:44:55.173055336Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:44:55.173874 env[1555]: time="2024-02-09T12:44:55.173830584Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:44:55.174799 env[1555]: time="2024-02-09T12:44:55.174755165Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 9 12:44:55.180927 env[1555]: time="2024-02-09T12:44:55.180876058Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 12:44:57.585646 env[1555]: time="2024-02-09T12:44:57.585591039Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:44:57.586199 env[1555]: time="2024-02-09T12:44:57.586159732Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:44:57.587199 env[1555]: time="2024-02-09T12:44:57.587156769Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:44:57.588261 env[1555]: time="2024-02-09T12:44:57.588218279Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:44:57.588758 env[1555]: time="2024-02-09T12:44:57.588715077Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 9 12:44:57.595623 env[1555]: time="2024-02-09T12:44:57.595606486Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 12:44:59.120143 env[1555]: time="2024-02-09T12:44:59.120090104Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:44:59.120676 env[1555]: time="2024-02-09T12:44:59.120654698Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:44:59.121827 env[1555]: time="2024-02-09T12:44:59.121816366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:44:59.122689 env[1555]: time="2024-02-09T12:44:59.122666492Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:44:59.123511 env[1555]: time="2024-02-09T12:44:59.123469660Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 9 12:44:59.129887 env[1555]: time="2024-02-09T12:44:59.129854815Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 12:45:00.070919 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1366370361.mount: Deactivated successfully. Feb 9 12:45:00.370594 env[1555]: time="2024-02-09T12:45:00.370514662Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:00.371128 env[1555]: time="2024-02-09T12:45:00.371093637Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:00.371748 env[1555]: time="2024-02-09T12:45:00.371706184Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:00.372379 env[1555]: time="2024-02-09T12:45:00.372340945Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:00.372758 env[1555]: time="2024-02-09T12:45:00.372720492Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 12:45:00.378307 env[1555]: time="2024-02-09T12:45:00.378292691Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 12:45:00.885907 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount470976505.mount: Deactivated successfully. Feb 9 12:45:00.887479 env[1555]: time="2024-02-09T12:45:00.887425468Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:00.888118 env[1555]: time="2024-02-09T12:45:00.888078560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:00.888821 env[1555]: time="2024-02-09T12:45:00.888798837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:00.889855 env[1555]: time="2024-02-09T12:45:00.889828122Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:00.890044 env[1555]: time="2024-02-09T12:45:00.890031917Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 12:45:00.895246 env[1555]: time="2024-02-09T12:45:00.895214666Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 12:45:01.408940 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 12:45:01.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:01.409514 systemd[1]: Stopped kubelet.service. Feb 9 12:45:01.412785 systemd[1]: Started kubelet.service. Feb 9 12:45:01.436429 kubelet[2082]: E0209 12:45:01.436342 2082 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 12:45:01.436810 kernel: kauditd_printk_skb: 65 callbacks suppressed Feb 9 12:45:01.436842 kernel: audit: type=1130 audit(1707482701.408:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:01.438554 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 12:45:01.438676 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 12:45:01.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:01.544099 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3397567535.mount: Deactivated successfully. Feb 9 12:45:01.565479 kernel: audit: type=1131 audit(1707482701.408:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:01.565513 kernel: audit: type=1130 audit(1707482701.411:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:01.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:01.629609 kernel: audit: type=1131 audit(1707482701.437:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 12:45:01.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 12:45:04.448501 env[1555]: time="2024-02-09T12:45:04.448452112Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:04.449061 env[1555]: time="2024-02-09T12:45:04.449020648Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:04.450040 env[1555]: time="2024-02-09T12:45:04.449983288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:04.450852 env[1555]: time="2024-02-09T12:45:04.450812447Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:04.451286 env[1555]: time="2024-02-09T12:45:04.451234460Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 9 12:45:04.456492 env[1555]: time="2024-02-09T12:45:04.456477341Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 12:45:05.091254 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount435812496.mount: Deactivated successfully. Feb 9 12:45:05.614665 env[1555]: time="2024-02-09T12:45:05.614639643Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:05.615196 env[1555]: time="2024-02-09T12:45:05.615185429Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:05.616024 env[1555]: time="2024-02-09T12:45:05.616012642Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:05.616903 env[1555]: time="2024-02-09T12:45:05.616861265Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:05.617631 env[1555]: time="2024-02-09T12:45:05.617581257Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 9 12:45:07.264577 systemd[1]: Stopped kubelet.service. Feb 9 12:45:07.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:07.274364 systemd[1]: Reloading. Feb 9 12:45:07.306866 /usr/lib/systemd/system-generators/torcx-generator[2230]: time="2024-02-09T12:45:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 12:45:07.306889 /usr/lib/systemd/system-generators/torcx-generator[2230]: time="2024-02-09T12:45:07Z" level=info msg="torcx already run" Feb 9 12:45:07.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:07.330394 kernel: audit: type=1130 audit(1707482707.263:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:07.330465 kernel: audit: type=1131 audit(1707482707.263:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:07.418528 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 12:45:07.418535 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 12:45:07.429376 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 12:45:07.484921 systemd[1]: Started kubelet.service. Feb 9 12:45:07.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:07.507457 kubelet[2295]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 12:45:07.507457 kubelet[2295]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 12:45:07.507457 kubelet[2295]: I0209 12:45:07.507434 2295 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 12:45:07.508304 kubelet[2295]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 12:45:07.508304 kubelet[2295]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 12:45:07.549423 kernel: audit: type=1130 audit(1707482707.484:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:07.785596 kubelet[2295]: I0209 12:45:07.785555 2295 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 12:45:07.785596 kubelet[2295]: I0209 12:45:07.785567 2295 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 12:45:07.785730 kubelet[2295]: I0209 12:45:07.785694 2295 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 12:45:07.787111 kubelet[2295]: I0209 12:45:07.787069 2295 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 12:45:07.787559 kubelet[2295]: E0209 12:45:07.787523 2295 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.91.169:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:07.805341 kubelet[2295]: I0209 12:45:07.805310 2295 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 12:45:07.805619 kubelet[2295]: I0209 12:45:07.805579 2295 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 12:45:07.805655 kubelet[2295]: I0209 12:45:07.805630 2295 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 12:45:07.805655 kubelet[2295]: I0209 12:45:07.805641 2295 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 12:45:07.805655 kubelet[2295]: I0209 12:45:07.805648 2295 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 12:45:07.805743 kubelet[2295]: I0209 12:45:07.805690 2295 state_mem.go:36] "Initialized new in-memory state store" Feb 9 12:45:07.807171 kubelet[2295]: I0209 12:45:07.807126 2295 kubelet.go:398] "Attempting to sync node with API server" Feb 9 12:45:07.807171 kubelet[2295]: I0209 12:45:07.807139 2295 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 12:45:07.807171 kubelet[2295]: I0209 12:45:07.807151 2295 kubelet.go:297] "Adding apiserver pod source" Feb 9 12:45:07.807171 kubelet[2295]: I0209 12:45:07.807159 2295 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 12:45:07.807442 kubelet[2295]: W0209 12:45:07.807383 2295 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.91.169:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:07.807442 kubelet[2295]: I0209 12:45:07.807408 2295 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 12:45:07.807442 kubelet[2295]: E0209 12:45:07.807430 2295 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.91.169:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:07.807442 kubelet[2295]: W0209 12:45:07.807422 2295 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.91.169:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-524ff09451&limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:07.807442 kubelet[2295]: E0209 12:45:07.807445 2295 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.91.169:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-524ff09451&limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:07.807604 kubelet[2295]: W0209 12:45:07.807565 2295 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 12:45:07.808037 kubelet[2295]: I0209 12:45:07.808000 2295 server.go:1186] "Started kubelet" Feb 9 12:45:07.808212 kubelet[2295]: I0209 12:45:07.808193 2295 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 12:45:07.808298 kubelet[2295]: E0209 12:45:07.808280 2295 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 12:45:07.808375 kubelet[2295]: E0209 12:45:07.808364 2295 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 12:45:07.808465 kubelet[2295]: E0209 12:45:07.808377 2295 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-524ff09451.17b23279e3044898", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-524ff09451", UID:"ci-3510.3.2-a-524ff09451", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-524ff09451"}, FirstTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 807979672, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 807979672, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://139.178.91.169:6443/api/v1/namespaces/default/events": dial tcp 139.178.91.169:6443: connect: connection refused'(may retry after sleeping) Feb 9 12:45:07.809183 kubelet[2295]: I0209 12:45:07.809173 2295 server.go:451] "Adding debug handlers to kubelet server" Feb 9 12:45:07.807000 audit[2295]: AVC avc: denied { mac_admin } for pid=2295 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:07.809278 kubelet[2295]: I0209 12:45:07.809218 2295 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 12:45:07.809278 kubelet[2295]: I0209 12:45:07.809237 2295 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 12:45:07.809278 kubelet[2295]: I0209 12:45:07.809270 2295 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 12:45:07.809397 kubelet[2295]: I0209 12:45:07.809325 2295 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 12:45:07.809397 kubelet[2295]: E0209 12:45:07.809326 2295 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-524ff09451\" not found" Feb 9 12:45:07.809397 kubelet[2295]: I0209 12:45:07.809345 2295 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 12:45:07.809478 kubelet[2295]: E0209 12:45:07.809464 2295 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://139.178.91.169:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-524ff09451?timeout=10s": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:07.809747 kubelet[2295]: W0209 12:45:07.809711 2295 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.91.169:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:07.809797 kubelet[2295]: E0209 12:45:07.809756 2295 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.91.169:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:07.829119 kubelet[2295]: I0209 12:45:07.829107 2295 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 12:45:07.829119 kubelet[2295]: I0209 12:45:07.829117 2295 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 12:45:07.829208 kubelet[2295]: I0209 12:45:07.829125 2295 state_mem.go:36] "Initialized new in-memory state store" Feb 9 12:45:07.829855 kubelet[2295]: I0209 12:45:07.829849 2295 policy_none.go:49] "None policy: Start" Feb 9 12:45:07.830228 kubelet[2295]: I0209 12:45:07.830221 2295 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 12:45:07.830247 kubelet[2295]: I0209 12:45:07.830233 2295 state_mem.go:35] "Initializing new in-memory state store" Feb 9 12:45:07.807000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:45:07.907841 kernel: audit: type=1400 audit(1707482707.807:185): avc: denied { mac_admin } for pid=2295 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:07.907873 kernel: audit: type=1401 audit(1707482707.807:185): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:45:07.907890 kernel: audit: type=1300 audit(1707482707.807:185): arch=c000003e syscall=188 success=no exit=-22 a0=c000ee00c0 a1=c0005b7410 a2=c000ee0090 a3=25 items=0 ppid=1 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:07.807000 audit[2295]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ee00c0 a1=c0005b7410 a2=c000ee0090 a3=25 items=0 ppid=1 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:07.910736 kubelet[2295]: I0209 12:45:07.910690 2295 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:07.910925 kubelet[2295]: E0209 12:45:07.910890 2295 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.91.169:6443/api/v1/nodes\": dial tcp 139.178.91.169:6443: connect: connection refused" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.002850 kernel: audit: type=1327 audit(1707482707.807:185): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:45:07.807000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:45:08.010184 kubelet[2295]: E0209 12:45:08.010141 2295 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://139.178.91.169:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-524ff09451?timeout=10s": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:08.095316 kernel: audit: type=1400 audit(1707482707.807:186): avc: denied { mac_admin } for pid=2295 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:07.807000 audit[2295]: AVC avc: denied { mac_admin } for pid=2295 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:08.096645 kubelet[2295]: I0209 12:45:08.096635 2295 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 12:45:08.096689 kubelet[2295]: I0209 12:45:08.096674 2295 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 12:45:08.096779 kubelet[2295]: I0209 12:45:08.096771 2295 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 12:45:08.097009 kubelet[2295]: E0209 12:45:08.097001 2295 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-524ff09451\" not found" Feb 9 12:45:08.111974 kubelet[2295]: I0209 12:45:08.111965 2295 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.112103 kubelet[2295]: E0209 12:45:08.112095 2295 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.91.169:6443/api/v1/nodes\": dial tcp 139.178.91.169:6443: connect: connection refused" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.159242 kernel: audit: type=1401 audit(1707482707.807:186): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:45:07.807000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:45:07.807000 audit[2295]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001096700 a1=c0005b7fb0 a2=c000ee0150 a3=25 items=0 ppid=1 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.286819 kernel: audit: type=1300 audit(1707482707.807:186): arch=c000003e syscall=188 success=no exit=-22 a0=c001096700 a1=c0005b7fb0 a2=c000ee0150 a3=25 items=0 ppid=1 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:07.807000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:45:07.809000 audit[2318]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:07.809000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffebfaf1210 a2=0 a3=7ffebfaf11fc items=0 ppid=2295 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:07.809000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 12:45:07.809000 audit[2319]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:07.809000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7597c470 a2=0 a3=7ffc7597c45c items=0 ppid=2295 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:07.809000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 12:45:07.810000 audit[2321]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:07.810000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc293a3ae0 a2=0 a3=7ffc293a3acc items=0 ppid=2295 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:07.810000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 12:45:07.811000 audit[2323]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:07.811000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff3b6818c0 a2=0 a3=7fff3b6818ac items=0 ppid=2295 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:07.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 12:45:08.095000 audit[2295]: AVC avc: denied { mac_admin } for pid=2295 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:08.095000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:45:08.095000 audit[2295]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0012e2a20 a1=c000991338 a2=c0012e29f0 a3=25 items=0 ppid=1 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.095000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:45:08.158000 audit[2330]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.158000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff0db67e10 a2=0 a3=7fff0db67dfc items=0 ppid=2295 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.158000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 12:45:08.159000 audit[2331]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.159000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe624e6550 a2=0 a3=7ffe624e653c items=0 ppid=2295 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 12:45:08.286000 audit[2334]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.286000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd77fac080 a2=0 a3=7ffd77fac06c items=0 ppid=2295 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 12:45:08.288000 audit[2337]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.288000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc367efa50 a2=0 a3=7ffc367efa3c items=0 ppid=2295 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 12:45:08.288000 audit[2338]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.288000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffdd547d60 a2=0 a3=7fffdd547d4c items=0 ppid=2295 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 12:45:08.289000 audit[2339]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.289000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca6dd0a20 a2=0 a3=7ffca6dd0a0c items=0 ppid=2295 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 12:45:08.290000 audit[2341]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.290000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffa2e01a00 a2=0 a3=7fffa2e019ec items=0 ppid=2295 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 12:45:08.291000 audit[2343]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.291000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd64c26c30 a2=0 a3=7ffd64c26c1c items=0 ppid=2295 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 12:45:08.292000 audit[2345]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.292000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffd0dc0bd60 a2=0 a3=7ffd0dc0bd4c items=0 ppid=2295 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 12:45:08.293000 audit[2347]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.293000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fff88806910 a2=0 a3=7fff888068fc items=0 ppid=2295 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 12:45:08.295000 audit[2349]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.295000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffd5535e700 a2=0 a3=7ffd5535e6ec items=0 ppid=2295 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 12:45:08.296632 kubelet[2295]: I0209 12:45:08.296563 2295 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 12:45:08.295000 audit[2350]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.295000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe76bc6890 a2=0 a3=7ffe76bc687c items=0 ppid=2295 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 12:45:08.295000 audit[2351]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.295000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc28c37060 a2=0 a3=7ffc28c3704c items=0 ppid=2295 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 12:45:08.296000 audit[2352]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.296000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcb3e9fcf0 a2=0 a3=7ffcb3e9fcdc items=0 ppid=2295 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 12:45:08.296000 audit[2353]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.296000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc91ee1aa0 a2=0 a3=7ffc91ee1a8c items=0 ppid=2295 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 12:45:08.296000 audit[2355]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:08.296000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe27cd6260 a2=0 a3=7ffe27cd624c items=0 ppid=2295 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 12:45:08.297000 audit[2356]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.297000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffb30149a0 a2=0 a3=7fffb301498c items=0 ppid=2295 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 12:45:08.297000 audit[2357]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.297000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffa6899cd0 a2=0 a3=7fffa6899cbc items=0 ppid=2295 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 12:45:08.298000 audit[2359]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.298000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffec3c66120 a2=0 a3=7ffec3c6610c items=0 ppid=2295 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 12:45:08.298000 audit[2360]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.298000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc9b5616a0 a2=0 a3=7ffc9b56168c items=0 ppid=2295 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 12:45:08.299000 audit[2361]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.299000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb7301a70 a2=0 a3=7ffcb7301a5c items=0 ppid=2295 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 12:45:08.300000 audit[2363]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.300000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc71e25850 a2=0 a3=7ffc71e2583c items=0 ppid=2295 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 12:45:08.301000 audit[2365]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.301000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc643742b0 a2=0 a3=7ffc6437429c items=0 ppid=2295 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 12:45:08.302000 audit[2367]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.302000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fffdc3a2740 a2=0 a3=7fffdc3a272c items=0 ppid=2295 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 12:45:08.303000 audit[2369]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.303000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffc6c9d4ea0 a2=0 a3=7ffc6c9d4e8c items=0 ppid=2295 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 12:45:08.305000 audit[2371]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.305000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffe98890760 a2=0 a3=7ffe9889074c items=0 ppid=2295 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 12:45:08.307017 kubelet[2295]: I0209 12:45:08.306967 2295 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 12:45:08.307017 kubelet[2295]: I0209 12:45:08.306978 2295 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 12:45:08.307017 kubelet[2295]: I0209 12:45:08.306988 2295 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 12:45:08.307017 kubelet[2295]: E0209 12:45:08.307010 2295 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 12:45:08.307263 kubelet[2295]: W0209 12:45:08.307242 2295 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.91.169:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:08.307289 kubelet[2295]: E0209 12:45:08.307270 2295 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.91.169:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:08.306000 audit[2372]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.306000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc375942f0 a2=0 a3=7ffc375942dc items=0 ppid=2295 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 12:45:08.306000 audit[2373]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.306000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe72181a70 a2=0 a3=7ffe72181a5c items=0 ppid=2295 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 12:45:08.306000 audit[2374]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:08.306000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc93808b90 a2=0 a3=7ffc93808b7c items=0 ppid=2295 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:08.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 12:45:08.407268 kubelet[2295]: I0209 12:45:08.407143 2295 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:45:08.409018 kubelet[2295]: I0209 12:45:08.408972 2295 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:45:08.410552 kubelet[2295]: E0209 12:45:08.410499 2295 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://139.178.91.169:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-524ff09451?timeout=10s": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:08.410552 kubelet[2295]: I0209 12:45:08.410525 2295 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:45:08.410761 kubelet[2295]: I0209 12:45:08.410745 2295 status_manager.go:698] "Failed to get status for pod" podUID=09c64fd21908ac31620552e4d460af6e pod="kube-system/kube-apiserver-ci-3510.3.2-a-524ff09451" err="Get \"https://139.178.91.169:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-a-524ff09451\": dial tcp 139.178.91.169:6443: connect: connection refused" Feb 9 12:45:08.411692 kubelet[2295]: I0209 12:45:08.411667 2295 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/09c64fd21908ac31620552e4d460af6e-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-524ff09451\" (UID: \"09c64fd21908ac31620552e4d460af6e\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.411829 kubelet[2295]: I0209 12:45:08.411714 2295 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d43403f05e9d3366d7b292529ca588f5-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-524ff09451\" (UID: \"d43403f05e9d3366d7b292529ca588f5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.411829 kubelet[2295]: I0209 12:45:08.411772 2295 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d43403f05e9d3366d7b292529ca588f5-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-524ff09451\" (UID: \"d43403f05e9d3366d7b292529ca588f5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.411829 kubelet[2295]: I0209 12:45:08.411808 2295 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d43403f05e9d3366d7b292529ca588f5-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-524ff09451\" (UID: \"d43403f05e9d3366d7b292529ca588f5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.412086 kubelet[2295]: I0209 12:45:08.411915 2295 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d43403f05e9d3366d7b292529ca588f5-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-524ff09451\" (UID: \"d43403f05e9d3366d7b292529ca588f5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.412086 kubelet[2295]: I0209 12:45:08.412015 2295 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d43403f05e9d3366d7b292529ca588f5-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-524ff09451\" (UID: \"d43403f05e9d3366d7b292529ca588f5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.412086 kubelet[2295]: I0209 12:45:08.412076 2295 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/09c64fd21908ac31620552e4d460af6e-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-524ff09451\" (UID: \"09c64fd21908ac31620552e4d460af6e\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.412313 kubelet[2295]: I0209 12:45:08.412131 2295 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/09c64fd21908ac31620552e4d460af6e-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-524ff09451\" (UID: \"09c64fd21908ac31620552e4d460af6e\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.412502 kubelet[2295]: I0209 12:45:08.412484 2295 status_manager.go:698] "Failed to get status for pod" podUID=d43403f05e9d3366d7b292529ca588f5 pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" err="Get \"https://139.178.91.169:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-a-524ff09451\": dial tcp 139.178.91.169:6443: connect: connection refused" Feb 9 12:45:08.414076 kubelet[2295]: I0209 12:45:08.414059 2295 status_manager.go:698] "Failed to get status for pod" podUID=93465c00475577d900459a6ad132f824 pod="kube-system/kube-scheduler-ci-3510.3.2-a-524ff09451" err="Get \"https://139.178.91.169:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-a-524ff09451\": dial tcp 139.178.91.169:6443: connect: connection refused" Feb 9 12:45:08.513558 kubelet[2295]: I0209 12:45:08.513455 2295 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/93465c00475577d900459a6ad132f824-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-524ff09451\" (UID: \"93465c00475577d900459a6ad132f824\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.516952 kubelet[2295]: I0209 12:45:08.516872 2295 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.517642 kubelet[2295]: E0209 12:45:08.517560 2295 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.91.169:6443/api/v1/nodes\": dial tcp 139.178.91.169:6443: connect: connection refused" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:08.714552 env[1555]: time="2024-02-09T12:45:08.714356531Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-524ff09451,Uid:09c64fd21908ac31620552e4d460af6e,Namespace:kube-system,Attempt:0,}" Feb 9 12:45:08.716342 env[1555]: time="2024-02-09T12:45:08.716239805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-524ff09451,Uid:d43403f05e9d3366d7b292529ca588f5,Namespace:kube-system,Attempt:0,}" Feb 9 12:45:08.718193 env[1555]: time="2024-02-09T12:45:08.718083045Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-524ff09451,Uid:93465c00475577d900459a6ad132f824,Namespace:kube-system,Attempt:0,}" Feb 9 12:45:08.869223 kubelet[2295]: W0209 12:45:08.869062 2295 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.91.169:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-524ff09451&limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:08.869223 kubelet[2295]: E0209 12:45:08.869206 2295 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.91.169:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-524ff09451&limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:08.871909 kubelet[2295]: W0209 12:45:08.871758 2295 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.91.169:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:08.871909 kubelet[2295]: E0209 12:45:08.871867 2295 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.91.169:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:09.143068 kubelet[2295]: W0209 12:45:09.142806 2295 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.91.169:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:09.143068 kubelet[2295]: E0209 12:45:09.142936 2295 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.91.169:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:09.212215 kubelet[2295]: E0209 12:45:09.212087 2295 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://139.178.91.169:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-524ff09451?timeout=10s": dial tcp 139.178.91.169:6443: connect: connection refused Feb 9 12:45:09.271266 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3147174589.mount: Deactivated successfully. Feb 9 12:45:09.272544 env[1555]: time="2024-02-09T12:45:09.272496640Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:09.273603 env[1555]: time="2024-02-09T12:45:09.273551356Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:09.274269 env[1555]: time="2024-02-09T12:45:09.274229687Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:09.276236 env[1555]: time="2024-02-09T12:45:09.276223056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:09.276826 env[1555]: time="2024-02-09T12:45:09.276800148Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:09.277505 env[1555]: time="2024-02-09T12:45:09.277493356Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:09.278719 env[1555]: time="2024-02-09T12:45:09.278707186Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:09.279111 env[1555]: time="2024-02-09T12:45:09.279098617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:09.280573 env[1555]: time="2024-02-09T12:45:09.280560436Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:09.281708 env[1555]: time="2024-02-09T12:45:09.281697643Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:09.282072 env[1555]: time="2024-02-09T12:45:09.282060634Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:09.282450 env[1555]: time="2024-02-09T12:45:09.282439937Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:09.288837 env[1555]: time="2024-02-09T12:45:09.288804315Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:45:09.288837 env[1555]: time="2024-02-09T12:45:09.288827429Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:45:09.288837 env[1555]: time="2024-02-09T12:45:09.288834570Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:45:09.288974 env[1555]: time="2024-02-09T12:45:09.288920582Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ca58e30c26058db0bcfe92811716a3e25a242cd4cae26673ce75db2680474a2 pid=2382 runtime=io.containerd.runc.v2 Feb 9 12:45:09.290948 env[1555]: time="2024-02-09T12:45:09.290916283Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:45:09.290948 env[1555]: time="2024-02-09T12:45:09.290937589Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:45:09.290948 env[1555]: time="2024-02-09T12:45:09.290943985Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:45:09.291057 env[1555]: time="2024-02-09T12:45:09.291008544Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/245e0a526cc3d57965dd65a8a34b0461c508a56126a8cb6f19777d855a92e3dd pid=2405 runtime=io.containerd.runc.v2 Feb 9 12:45:09.291308 env[1555]: time="2024-02-09T12:45:09.291283191Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:45:09.291308 env[1555]: time="2024-02-09T12:45:09.291299181Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:45:09.291308 env[1555]: time="2024-02-09T12:45:09.291305795Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:45:09.291405 env[1555]: time="2024-02-09T12:45:09.291362654Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/02f784f628216141d29953d74104b7dfdbedaaa15be2e98043a2f90c1f5f0db2 pid=2412 runtime=io.containerd.runc.v2 Feb 9 12:45:09.319131 env[1555]: time="2024-02-09T12:45:09.319105065Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-524ff09451,Uid:09c64fd21908ac31620552e4d460af6e,Namespace:kube-system,Attempt:0,} returns sandbox id \"245e0a526cc3d57965dd65a8a34b0461c508a56126a8cb6f19777d855a92e3dd\"" Feb 9 12:45:09.319217 kubelet[2295]: I0209 12:45:09.319156 2295 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:09.319350 kubelet[2295]: E0209 12:45:09.319341 2295 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.91.169:6443/api/v1/nodes\": dial tcp 139.178.91.169:6443: connect: connection refused" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:09.320595 env[1555]: time="2024-02-09T12:45:09.320580023Z" level=info msg="CreateContainer within sandbox \"245e0a526cc3d57965dd65a8a34b0461c508a56126a8cb6f19777d855a92e3dd\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 12:45:09.325163 env[1555]: time="2024-02-09T12:45:09.325144735Z" level=info msg="CreateContainer within sandbox \"245e0a526cc3d57965dd65a8a34b0461c508a56126a8cb6f19777d855a92e3dd\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"a8a0f6a0e91db208565b2de329dba619d0bad06369ba3bda2a74136182e357cd\"" Feb 9 12:45:09.325401 env[1555]: time="2024-02-09T12:45:09.325383515Z" level=info msg="StartContainer for \"a8a0f6a0e91db208565b2de329dba619d0bad06369ba3bda2a74136182e357cd\"" Feb 9 12:45:09.333107 env[1555]: time="2024-02-09T12:45:09.333051564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-524ff09451,Uid:93465c00475577d900459a6ad132f824,Namespace:kube-system,Attempt:0,} returns sandbox id \"02f784f628216141d29953d74104b7dfdbedaaa15be2e98043a2f90c1f5f0db2\"" Feb 9 12:45:09.334110 env[1555]: time="2024-02-09T12:45:09.334092690Z" level=info msg="CreateContainer within sandbox \"02f784f628216141d29953d74104b7dfdbedaaa15be2e98043a2f90c1f5f0db2\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 12:45:09.338361 env[1555]: time="2024-02-09T12:45:09.338295123Z" level=info msg="CreateContainer within sandbox \"02f784f628216141d29953d74104b7dfdbedaaa15be2e98043a2f90c1f5f0db2\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"a4a522c6b3085d37949998b1d65f201e7be716b210ec2c2dcb17e8308e6666fa\"" Feb 9 12:45:09.338667 env[1555]: time="2024-02-09T12:45:09.338634409Z" level=info msg="StartContainer for \"a4a522c6b3085d37949998b1d65f201e7be716b210ec2c2dcb17e8308e6666fa\"" Feb 9 12:45:09.340597 env[1555]: time="2024-02-09T12:45:09.340581567Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-524ff09451,Uid:d43403f05e9d3366d7b292529ca588f5,Namespace:kube-system,Attempt:0,} returns sandbox id \"2ca58e30c26058db0bcfe92811716a3e25a242cd4cae26673ce75db2680474a2\"" Feb 9 12:45:09.341744 env[1555]: time="2024-02-09T12:45:09.341728071Z" level=info msg="CreateContainer within sandbox \"2ca58e30c26058db0bcfe92811716a3e25a242cd4cae26673ce75db2680474a2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 12:45:09.345918 env[1555]: time="2024-02-09T12:45:09.345896907Z" level=info msg="CreateContainer within sandbox \"2ca58e30c26058db0bcfe92811716a3e25a242cd4cae26673ce75db2680474a2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"a736075b5d33a6d84afec38e056dc43e940a5ff552db751fd83ec1ad5599559f\"" Feb 9 12:45:09.346266 env[1555]: time="2024-02-09T12:45:09.346254779Z" level=info msg="StartContainer for \"a736075b5d33a6d84afec38e056dc43e940a5ff552db751fd83ec1ad5599559f\"" Feb 9 12:45:09.361028 env[1555]: time="2024-02-09T12:45:09.361003291Z" level=info msg="StartContainer for \"a8a0f6a0e91db208565b2de329dba619d0bad06369ba3bda2a74136182e357cd\" returns successfully" Feb 9 12:45:09.391144 env[1555]: time="2024-02-09T12:45:09.391117214Z" level=info msg="StartContainer for \"a736075b5d33a6d84afec38e056dc43e940a5ff552db751fd83ec1ad5599559f\" returns successfully" Feb 9 12:45:09.391238 env[1555]: time="2024-02-09T12:45:09.391117772Z" level=info msg="StartContainer for \"a4a522c6b3085d37949998b1d65f201e7be716b210ec2c2dcb17e8308e6666fa\" returns successfully" Feb 9 12:45:10.821125 kubelet[2295]: E0209 12:45:10.821025 2295 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-524ff09451\" not found" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:10.923284 kubelet[2295]: I0209 12:45:10.923202 2295 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:11.414827 kubelet[2295]: I0209 12:45:11.414778 2295 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:11.433179 kubelet[2295]: E0209 12:45:11.433094 2295 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-524ff09451\" not found" Feb 9 12:45:11.534358 kubelet[2295]: E0209 12:45:11.534262 2295 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-524ff09451\" not found" Feb 9 12:45:11.556071 kubelet[2295]: E0209 12:45:11.555900 2295 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-524ff09451.17b23279e3044898", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-524ff09451", UID:"ci-3510.3.2-a-524ff09451", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-524ff09451"}, FirstTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 807979672, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 807979672, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 12:45:11.611939 kubelet[2295]: E0209 12:45:11.611746 2295 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-524ff09451.17b23279e309fa48", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-524ff09451", UID:"ci-3510.3.2-a-524ff09451", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-524ff09451"}, FirstTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 808352840, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 808352840, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 12:45:11.635085 kubelet[2295]: E0209 12:45:11.634997 2295 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-524ff09451\" not found" Feb 9 12:45:11.668023 kubelet[2295]: E0209 12:45:11.667748 2295 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-524ff09451.17b23279e4407ce9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-524ff09451", UID:"ci-3510.3.2-a-524ff09451", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-524ff09451 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-524ff09451"}, FirstTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 828702441, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 828702441, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 12:45:11.723634 kubelet[2295]: E0209 12:45:11.723455 2295 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-524ff09451.17b23279e4408d63", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-524ff09451", UID:"ci-3510.3.2-a-524ff09451", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.2-a-524ff09451 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-524ff09451"}, FirstTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 828706659, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 828706659, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 12:45:11.735730 kubelet[2295]: E0209 12:45:11.735675 2295 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-524ff09451\" not found" Feb 9 12:45:11.780078 kubelet[2295]: E0209 12:45:11.779926 2295 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-524ff09451.17b23279e4409500", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-524ff09451", UID:"ci-3510.3.2-a-524ff09451", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.2-a-524ff09451 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-524ff09451"}, FirstTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 828708608, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 828708608, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 12:45:11.836026 kubelet[2295]: E0209 12:45:11.835938 2295 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-524ff09451\" not found" Feb 9 12:45:11.841037 kubelet[2295]: E0209 12:45:11.840872 2295 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-524ff09451.17b23279e4407ce9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-524ff09451", UID:"ci-3510.3.2-a-524ff09451", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-524ff09451 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-524ff09451"}, FirstTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 828702441, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 910671819, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 12:45:11.902225 kubelet[2295]: E0209 12:45:11.902015 2295 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-524ff09451.17b23279e4408d63", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-524ff09451", UID:"ci-3510.3.2-a-524ff09451", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.2-a-524ff09451 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-524ff09451"}, FirstTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 828706659, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 12, 45, 7, 910674482, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 12:45:11.937136 kubelet[2295]: E0209 12:45:11.936958 2295 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-524ff09451\" not found" Feb 9 12:45:12.808111 kubelet[2295]: I0209 12:45:12.808019 2295 apiserver.go:52] "Watching apiserver" Feb 9 12:45:13.091652 systemd[1]: Reloading. Feb 9 12:45:13.131561 /usr/lib/systemd/system-generators/torcx-generator[2663]: time="2024-02-09T12:45:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 12:45:13.131578 /usr/lib/systemd/system-generators/torcx-generator[2663]: time="2024-02-09T12:45:13Z" level=info msg="torcx already run" Feb 9 12:45:13.189011 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 12:45:13.189021 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 12:45:13.201862 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 12:45:13.260617 kubelet[2295]: I0209 12:45:13.260598 2295 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 12:45:13.260630 systemd[1]: Stopping kubelet.service... Feb 9 12:45:13.278731 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 12:45:13.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:13.278881 systemd[1]: Stopped kubelet.service. Feb 9 12:45:13.279793 systemd[1]: Started kubelet.service. Feb 9 12:45:13.302115 kubelet[2728]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 12:45:13.302115 kubelet[2728]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 12:45:13.302344 kubelet[2728]: I0209 12:45:13.302137 2728 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 12:45:13.303507 kubelet[2728]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 12:45:13.303507 kubelet[2728]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 12:45:13.305144 kubelet[2728]: I0209 12:45:13.305136 2728 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 12:45:13.305144 kubelet[2728]: I0209 12:45:13.305145 2728 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 12:45:13.305190 kernel: kauditd_printk_skb: 104 callbacks suppressed Feb 9 12:45:13.305218 kernel: audit: type=1131 audit(1707482713.278:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:13.305253 kubelet[2728]: I0209 12:45:13.305248 2728 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 12:45:13.305925 kubelet[2728]: I0209 12:45:13.305914 2728 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 12:45:13.306304 kubelet[2728]: I0209 12:45:13.306268 2728 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 12:45:13.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:13.432186 kernel: audit: type=1130 audit(1707482713.279:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:13.437409 kubelet[2728]: I0209 12:45:13.437369 2728 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 12:45:13.437605 kubelet[2728]: I0209 12:45:13.437599 2728 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 12:45:13.437644 kubelet[2728]: I0209 12:45:13.437639 2728 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 12:45:13.437697 kubelet[2728]: I0209 12:45:13.437651 2728 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 12:45:13.437697 kubelet[2728]: I0209 12:45:13.437658 2728 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 12:45:13.437697 kubelet[2728]: I0209 12:45:13.437677 2728 state_mem.go:36] "Initialized new in-memory state store" Feb 9 12:45:13.439807 kubelet[2728]: I0209 12:45:13.439798 2728 kubelet.go:398] "Attempting to sync node with API server" Feb 9 12:45:13.439857 kubelet[2728]: I0209 12:45:13.439813 2728 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 12:45:13.439857 kubelet[2728]: I0209 12:45:13.439830 2728 kubelet.go:297] "Adding apiserver pod source" Feb 9 12:45:13.439857 kubelet[2728]: I0209 12:45:13.439840 2728 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 12:45:13.440123 kubelet[2728]: I0209 12:45:13.440114 2728 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 12:45:13.440403 kubelet[2728]: I0209 12:45:13.440396 2728 server.go:1186] "Started kubelet" Feb 9 12:45:13.440445 kubelet[2728]: I0209 12:45:13.440432 2728 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 12:45:13.440583 kubelet[2728]: E0209 12:45:13.440573 2728 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 12:45:13.440621 kubelet[2728]: E0209 12:45:13.440587 2728 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 12:45:13.440937 kubelet[2728]: I0209 12:45:13.440931 2728 server.go:451] "Adding debug handlers to kubelet server" Feb 9 12:45:13.440000 audit[2728]: AVC avc: denied { mac_admin } for pid=2728 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:13.441282 kubelet[2728]: I0209 12:45:13.441264 2728 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 12:45:13.441303 kubelet[2728]: I0209 12:45:13.441290 2728 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 12:45:13.441321 kubelet[2728]: I0209 12:45:13.441307 2728 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 12:45:13.441347 kubelet[2728]: I0209 12:45:13.441341 2728 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 12:45:13.441376 kubelet[2728]: I0209 12:45:13.441357 2728 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 12:45:13.452488 kubelet[2728]: I0209 12:45:13.452475 2728 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 12:45:13.458896 kubelet[2728]: I0209 12:45:13.458883 2728 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 12:45:13.458896 kubelet[2728]: I0209 12:45:13.458895 2728 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 12:45:13.458997 kubelet[2728]: I0209 12:45:13.458908 2728 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 12:45:13.458997 kubelet[2728]: E0209 12:45:13.458938 2728 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 12:45:13.470818 kubelet[2728]: I0209 12:45:13.470805 2728 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 12:45:13.470818 kubelet[2728]: I0209 12:45:13.470815 2728 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 12:45:13.470818 kubelet[2728]: I0209 12:45:13.470824 2728 state_mem.go:36] "Initialized new in-memory state store" Feb 9 12:45:13.470941 kubelet[2728]: I0209 12:45:13.470917 2728 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 12:45:13.470941 kubelet[2728]: I0209 12:45:13.470925 2728 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 12:45:13.470941 kubelet[2728]: I0209 12:45:13.470928 2728 policy_none.go:49] "None policy: Start" Feb 9 12:45:13.471157 kubelet[2728]: I0209 12:45:13.471149 2728 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 12:45:13.471191 kubelet[2728]: I0209 12:45:13.471162 2728 state_mem.go:35] "Initializing new in-memory state store" Feb 9 12:45:13.471252 kubelet[2728]: I0209 12:45:13.471245 2728 state_mem.go:75] "Updated machine memory state" Feb 9 12:45:13.471865 kubelet[2728]: I0209 12:45:13.471858 2728 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 12:45:13.471903 kubelet[2728]: I0209 12:45:13.471894 2728 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 12:45:13.472012 kubelet[2728]: I0209 12:45:13.472005 2728 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 12:45:13.440000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:45:13.536840 kernel: audit: type=1400 audit(1707482713.440:223): avc: denied { mac_admin } for pid=2728 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:13.536903 kernel: audit: type=1401 audit(1707482713.440:223): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:45:13.536923 kernel: audit: type=1300 audit(1707482713.440:223): arch=c000003e syscall=188 success=no exit=-22 a0=c000331bc0 a1=c000541800 a2=c000331b90 a3=25 items=0 ppid=1 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:13.440000 audit[2728]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000331bc0 a1=c000541800 a2=c000331b90 a3=25 items=0 ppid=1 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:13.543829 kubelet[2728]: I0209 12:45:13.543777 2728 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.546842 kubelet[2728]: I0209 12:45:13.546804 2728 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.546842 kubelet[2728]: I0209 12:45:13.546844 2728 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.559892 kubelet[2728]: I0209 12:45:13.559840 2728 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:45:13.559977 kubelet[2728]: I0209 12:45:13.559900 2728 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:45:13.559977 kubelet[2728]: I0209 12:45:13.559918 2728 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:45:13.562474 kubelet[2728]: E0209 12:45:13.562456 2728 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-524ff09451\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.440000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:45:13.643092 kubelet[2728]: E0209 12:45:13.643055 2728 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-524ff09451\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.721868 kernel: audit: type=1327 audit(1707482713.440:223): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:45:13.721928 kernel: audit: type=1400 audit(1707482713.440:224): avc: denied { mac_admin } for pid=2728 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:13.440000 audit[2728]: AVC avc: denied { mac_admin } for pid=2728 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:13.742788 kubelet[2728]: I0209 12:45:13.742769 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d43403f05e9d3366d7b292529ca588f5-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-524ff09451\" (UID: \"d43403f05e9d3366d7b292529ca588f5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.742873 kubelet[2728]: I0209 12:45:13.742817 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d43403f05e9d3366d7b292529ca588f5-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-524ff09451\" (UID: \"d43403f05e9d3366d7b292529ca588f5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.742873 kubelet[2728]: I0209 12:45:13.742836 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d43403f05e9d3366d7b292529ca588f5-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-524ff09451\" (UID: \"d43403f05e9d3366d7b292529ca588f5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.742873 kubelet[2728]: I0209 12:45:13.742848 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/09c64fd21908ac31620552e4d460af6e-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-524ff09451\" (UID: \"09c64fd21908ac31620552e4d460af6e\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.742983 kubelet[2728]: I0209 12:45:13.742876 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/09c64fd21908ac31620552e4d460af6e-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-524ff09451\" (UID: \"09c64fd21908ac31620552e4d460af6e\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.742983 kubelet[2728]: I0209 12:45:13.742899 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d43403f05e9d3366d7b292529ca588f5-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-524ff09451\" (UID: \"d43403f05e9d3366d7b292529ca588f5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.742983 kubelet[2728]: I0209 12:45:13.742917 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/93465c00475577d900459a6ad132f824-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-524ff09451\" (UID: \"93465c00475577d900459a6ad132f824\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.742983 kubelet[2728]: I0209 12:45:13.742943 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/09c64fd21908ac31620552e4d460af6e-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-524ff09451\" (UID: \"09c64fd21908ac31620552e4d460af6e\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.742983 kubelet[2728]: I0209 12:45:13.742971 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d43403f05e9d3366d7b292529ca588f5-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-524ff09451\" (UID: \"d43403f05e9d3366d7b292529ca588f5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.440000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:45:13.816795 kernel: audit: type=1401 audit(1707482713.440:224): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:45:13.816860 kernel: audit: type=1300 audit(1707482713.440:224): arch=c000003e syscall=188 success=no exit=-22 a0=c001296540 a1=c000541818 a2=c000331c50 a3=25 items=0 ppid=1 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:13.440000 audit[2728]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001296540 a1=c000541818 a2=c000331c50 a3=25 items=0 ppid=1 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:13.844917 kubelet[2728]: E0209 12:45:13.844857 2728 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-524ff09451\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" Feb 9 12:45:13.440000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:45:14.003241 kernel: audit: type=1327 audit(1707482713.440:224): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:45:13.471000 audit[2728]: AVC avc: denied { mac_admin } for pid=2728 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:13.471000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:45:13.471000 audit[2728]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001584450 a1=c00114b5a8 a2=c001584420 a3=25 items=0 ppid=1 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:13.471000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:45:14.440327 kubelet[2728]: I0209 12:45:14.440255 2728 apiserver.go:52] "Watching apiserver" Feb 9 12:45:14.742778 kubelet[2728]: I0209 12:45:14.742557 2728 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 12:45:14.747744 kubelet[2728]: I0209 12:45:14.747663 2728 reconciler.go:41] "Reconciler: start to sync state" Feb 9 12:45:15.043940 kubelet[2728]: E0209 12:45:15.043880 2728 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-524ff09451\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-524ff09451" Feb 9 12:45:15.247318 kubelet[2728]: E0209 12:45:15.247251 2728 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-524ff09451\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-524ff09451" Feb 9 12:45:15.449479 kubelet[2728]: E0209 12:45:15.449420 2728 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-524ff09451\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" Feb 9 12:45:15.654105 kubelet[2728]: I0209 12:45:15.654061 2728 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-524ff09451" podStartSLOduration=2.654033306 pod.CreationTimestamp="2024-02-09 12:45:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 12:45:15.65277692 +0000 UTC m=+2.371253729" watchObservedRunningTime="2024-02-09 12:45:15.654033306 +0000 UTC m=+2.372510113" Feb 9 12:45:16.446439 kubelet[2728]: I0209 12:45:16.446423 2728 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-524ff09451" podStartSLOduration=4.446400666 pod.CreationTimestamp="2024-02-09 12:45:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 12:45:16.446244571 +0000 UTC m=+3.164721381" watchObservedRunningTime="2024-02-09 12:45:16.446400666 +0000 UTC m=+3.164877473" Feb 9 12:45:16.852752 kubelet[2728]: I0209 12:45:16.852564 2728 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-524ff09451" podStartSLOduration=3.852465332 pod.CreationTimestamp="2024-02-09 12:45:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 12:45:16.852274731 +0000 UTC m=+3.570751655" watchObservedRunningTime="2024-02-09 12:45:16.852465332 +0000 UTC m=+3.570942214" Feb 9 12:45:18.781144 sudo[1750]: pam_unix(sudo:session): session closed for user root Feb 9 12:45:18.779000 audit[1750]: USER_END pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:45:18.782004 sshd[1744]: pam_unix(sshd:session): session closed for user core Feb 9 12:45:18.783746 systemd[1]: sshd@6-139.178.91.169:22-147.75.109.163:37810.service: Deactivated successfully. Feb 9 12:45:18.784472 systemd-logind[1541]: Session 9 logged out. Waiting for processes to exit. Feb 9 12:45:18.784496 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 12:45:18.785203 systemd-logind[1541]: Removed session 9. Feb 9 12:45:18.807508 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 9 12:45:18.807539 kernel: audit: type=1106 audit(1707482718.779:226): pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:45:18.779000 audit[1750]: CRED_DISP pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:45:18.978980 kernel: audit: type=1104 audit(1707482718.779:227): pid=1750 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:45:18.979003 kernel: audit: type=1106 audit(1707482718.781:228): pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:45:18.781000 audit[1744]: USER_END pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:45:19.071971 kernel: audit: type=1104 audit(1707482718.781:229): pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:45:18.781000 audit[1744]: CRED_DISP pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:45:19.159039 kernel: audit: type=1131 audit(1707482718.782:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.91.169:22-147.75.109.163:37810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:18.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.91.169:22-147.75.109.163:37810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:20.827178 update_engine[1543]: I0209 12:45:20.827093 1543 update_attempter.cc:509] Updating boot flags... Feb 9 12:45:27.342926 kubelet[2728]: I0209 12:45:27.342909 2728 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 12:45:27.343187 env[1555]: time="2024-02-09T12:45:27.343138218Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 12:45:27.343315 kubelet[2728]: I0209 12:45:27.343237 2728 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 12:45:28.263909 kubelet[2728]: I0209 12:45:28.263840 2728 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:45:28.338652 kubelet[2728]: I0209 12:45:28.338601 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a6a4646f-8084-4896-a41e-19d939bead97-xtables-lock\") pod \"kube-proxy-n7jn6\" (UID: \"a6a4646f-8084-4896-a41e-19d939bead97\") " pod="kube-system/kube-proxy-n7jn6" Feb 9 12:45:28.338898 kubelet[2728]: I0209 12:45:28.338722 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a6a4646f-8084-4896-a41e-19d939bead97-lib-modules\") pod \"kube-proxy-n7jn6\" (UID: \"a6a4646f-8084-4896-a41e-19d939bead97\") " pod="kube-system/kube-proxy-n7jn6" Feb 9 12:45:28.338898 kubelet[2728]: I0209 12:45:28.338812 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mg5pb\" (UniqueName: \"kubernetes.io/projected/a6a4646f-8084-4896-a41e-19d939bead97-kube-api-access-mg5pb\") pod \"kube-proxy-n7jn6\" (UID: \"a6a4646f-8084-4896-a41e-19d939bead97\") " pod="kube-system/kube-proxy-n7jn6" Feb 9 12:45:28.339116 kubelet[2728]: I0209 12:45:28.338960 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a6a4646f-8084-4896-a41e-19d939bead97-kube-proxy\") pod \"kube-proxy-n7jn6\" (UID: \"a6a4646f-8084-4896-a41e-19d939bead97\") " pod="kube-system/kube-proxy-n7jn6" Feb 9 12:45:28.445435 kubelet[2728]: I0209 12:45:28.445368 2728 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:45:28.540283 kubelet[2728]: I0209 12:45:28.540103 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-smwnr\" (UniqueName: \"kubernetes.io/projected/61fd5998-3a9d-4589-99c6-30be97fc3b20-kube-api-access-smwnr\") pod \"tigera-operator-cfc98749c-wqjql\" (UID: \"61fd5998-3a9d-4589-99c6-30be97fc3b20\") " pod="tigera-operator/tigera-operator-cfc98749c-wqjql" Feb 9 12:45:28.540283 kubelet[2728]: I0209 12:45:28.540216 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/61fd5998-3a9d-4589-99c6-30be97fc3b20-var-lib-calico\") pod \"tigera-operator-cfc98749c-wqjql\" (UID: \"61fd5998-3a9d-4589-99c6-30be97fc3b20\") " pod="tigera-operator/tigera-operator-cfc98749c-wqjql" Feb 9 12:45:28.569813 env[1555]: time="2024-02-09T12:45:28.569729486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n7jn6,Uid:a6a4646f-8084-4896-a41e-19d939bead97,Namespace:kube-system,Attempt:0,}" Feb 9 12:45:28.594144 env[1555]: time="2024-02-09T12:45:28.593992082Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:45:28.594144 env[1555]: time="2024-02-09T12:45:28.594084972Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:45:28.594144 env[1555]: time="2024-02-09T12:45:28.594122843Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:45:28.594685 env[1555]: time="2024-02-09T12:45:28.594578626Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d73fcbac49e158b74a138c2881e1bd7097a76725bcb1e61aeb51ff0aff2c65bd pid=2941 runtime=io.containerd.runc.v2 Feb 9 12:45:28.679623 env[1555]: time="2024-02-09T12:45:28.679568014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n7jn6,Uid:a6a4646f-8084-4896-a41e-19d939bead97,Namespace:kube-system,Attempt:0,} returns sandbox id \"d73fcbac49e158b74a138c2881e1bd7097a76725bcb1e61aeb51ff0aff2c65bd\"" Feb 9 12:45:28.682473 env[1555]: time="2024-02-09T12:45:28.682381648Z" level=info msg="CreateContainer within sandbox \"d73fcbac49e158b74a138c2881e1bd7097a76725bcb1e61aeb51ff0aff2c65bd\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 12:45:28.692880 env[1555]: time="2024-02-09T12:45:28.692807984Z" level=info msg="CreateContainer within sandbox \"d73fcbac49e158b74a138c2881e1bd7097a76725bcb1e61aeb51ff0aff2c65bd\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0f64d2fdb914697550a1d01c7eb01dd7a2c3f1582855a1d99d619de159664ed0\"" Feb 9 12:45:28.693461 env[1555]: time="2024-02-09T12:45:28.693372903Z" level=info msg="StartContainer for \"0f64d2fdb914697550a1d01c7eb01dd7a2c3f1582855a1d99d619de159664ed0\"" Feb 9 12:45:28.751870 env[1555]: time="2024-02-09T12:45:28.751731142Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-wqjql,Uid:61fd5998-3a9d-4589-99c6-30be97fc3b20,Namespace:tigera-operator,Attempt:0,}" Feb 9 12:45:28.773066 env[1555]: time="2024-02-09T12:45:28.772874518Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:45:28.773066 env[1555]: time="2024-02-09T12:45:28.772971782Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:45:28.773066 env[1555]: time="2024-02-09T12:45:28.773015468Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:45:28.773714 env[1555]: time="2024-02-09T12:45:28.773659926Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c718427627a9e00c5464b175211973110406e7ff750365cd8c7f2b1cb3a30bb7 pid=3005 runtime=io.containerd.runc.v2 Feb 9 12:45:28.789681 env[1555]: time="2024-02-09T12:45:28.789626789Z" level=info msg="StartContainer for \"0f64d2fdb914697550a1d01c7eb01dd7a2c3f1582855a1d99d619de159664ed0\" returns successfully" Feb 9 12:45:28.837000 audit[3077]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.837000 audit[3077]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce8284430 a2=0 a3=7ffce828441c items=0 ppid=2992 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.990993 kernel: audit: type=1325 audit(1707482728.837:231): table=mangle:59 family=2 entries=1 op=nft_register_chain pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.991056 kernel: audit: type=1300 audit(1707482728.837:231): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce8284430 a2=0 a3=7ffce828441c items=0 ppid=2992 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.991075 kernel: audit: type=1327 audit(1707482728.837:231): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 12:45:28.837000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 12:45:28.993346 env[1555]: time="2024-02-09T12:45:28.993326989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-wqjql,Uid:61fd5998-3a9d-4589-99c6-30be97fc3b20,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"c718427627a9e00c5464b175211973110406e7ff750365cd8c7f2b1cb3a30bb7\"" Feb 9 12:45:28.993997 env[1555]: time="2024-02-09T12:45:28.993986714Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 12:45:29.048779 kernel: audit: type=1325 audit(1707482728.837:232): table=mangle:60 family=10 entries=1 op=nft_register_chain pid=3078 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:28.837000 audit[3078]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=3078 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.106765 kernel: audit: type=1300 audit(1707482728.837:232): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea4786730 a2=0 a3=7ffea478671c items=0 ppid=2992 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.837000 audit[3078]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea4786730 a2=0 a3=7ffea478671c items=0 ppid=2992 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.202887 kernel: audit: type=1327 audit(1707482728.837:232): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 12:45:28.837000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 12:45:29.261047 kernel: audit: type=1325 audit(1707482728.838:233): table=nat:61 family=10 entries=1 op=nft_register_chain pid=3081 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:28.838000 audit[3081]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=3081 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.318811 kernel: audit: type=1300 audit(1707482728.838:233): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa7d3d900 a2=0 a3=7fffa7d3d8ec items=0 ppid=2992 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.838000 audit[3081]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa7d3d900 a2=0 a3=7fffa7d3d8ec items=0 ppid=2992 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.415537 kernel: audit: type=1327 audit(1707482728.838:233): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 12:45:28.838000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 12:45:29.473642 kernel: audit: type=1325 audit(1707482728.838:234): table=nat:62 family=2 entries=1 op=nft_register_chain pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.838000 audit[3079]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_chain pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:29.498979 kubelet[2728]: I0209 12:45:29.498933 2728 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-n7jn6" podStartSLOduration=1.4989123979999999 pod.CreationTimestamp="2024-02-09 12:45:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 12:45:29.498635495 +0000 UTC m=+16.217112305" watchObservedRunningTime="2024-02-09 12:45:29.498912398 +0000 UTC m=+16.217389205" Feb 9 12:45:28.838000 audit[3079]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc92b5d320 a2=0 a3=31030 items=0 ppid=2992 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 12:45:28.838000 audit[3086]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=3086 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:28.838000 audit[3086]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9ae70040 a2=0 a3=7ffc9ae7002c items=0 ppid=2992 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.838000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 12:45:28.838000 audit[3087]: NETFILTER_CFG table=filter:64 family=2 entries=1 op=nft_register_chain pid=3087 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.838000 audit[3087]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd13c4ae60 a2=0 a3=7ffd13c4ae4c items=0 ppid=2992 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 12:45:28.940000 audit[3088]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=3088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.940000 audit[3088]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe474c9df0 a2=0 a3=7ffe474c9ddc items=0 ppid=2992 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 12:45:28.942000 audit[3090]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=3090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.942000 audit[3090]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc9e1a9b10 a2=0 a3=7ffc9e1a9afc items=0 ppid=2992 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.942000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 12:45:28.944000 audit[3093]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=3093 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.944000 audit[3093]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd2d706a80 a2=0 a3=7ffd2d706a6c items=0 ppid=2992 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.944000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 12:45:28.944000 audit[3094]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=3094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.944000 audit[3094]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc464daf00 a2=0 a3=7ffc464daeec items=0 ppid=2992 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.944000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 12:45:28.946000 audit[3096]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.946000 audit[3096]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe37c8c8e0 a2=0 a3=7ffe37c8c8cc items=0 ppid=2992 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 12:45:28.946000 audit[3097]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=3097 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.946000 audit[3097]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0b844f60 a2=0 a3=7fff0b844f4c items=0 ppid=2992 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 12:45:28.948000 audit[3099]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.948000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff275c9f20 a2=0 a3=7fff275c9f0c items=0 ppid=2992 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.948000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 12:45:28.949000 audit[3102]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=3102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.949000 audit[3102]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffe96a9910 a2=0 a3=7fffe96a98fc items=0 ppid=2992 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 12:45:28.950000 audit[3103]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=3103 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.950000 audit[3103]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe302be950 a2=0 a3=7ffe302be93c items=0 ppid=2992 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 12:45:28.951000 audit[3105]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=3105 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.951000 audit[3105]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc160c4810 a2=0 a3=7ffc160c47fc items=0 ppid=2992 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.951000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 12:45:28.952000 audit[3106]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:28.952000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc96c979d0 a2=0 a3=7ffc96c979bc items=0 ppid=2992 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:28.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 12:45:29.531000 audit[3108]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=3108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:29.531000 audit[3108]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7f796f50 a2=0 a3=7ffd7f796f3c items=0 ppid=2992 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.531000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 12:45:29.533000 audit[3111]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=3111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:29.533000 audit[3111]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2a431580 a2=0 a3=7ffc2a43156c items=0 ppid=2992 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.533000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 12:45:29.535000 audit[3114]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:29.535000 audit[3114]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdb68cf70 a2=0 a3=7fffdb68cf5c items=0 ppid=2992 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 12:45:29.536000 audit[3115]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:29.536000 audit[3115]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe0517f630 a2=0 a3=7ffe0517f61c items=0 ppid=2992 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 12:45:29.537000 audit[3117]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=3117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:29.537000 audit[3117]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd72df61b0 a2=0 a3=7ffd72df619c items=0 ppid=2992 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 12:45:29.539000 audit[3120]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=3120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:45:29.539000 audit[3120]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffcb803780 a2=0 a3=7fffcb80376c items=0 ppid=2992 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 12:45:29.545000 audit[3124]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=3124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:29.545000 audit[3124]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffe92735e90 a2=0 a3=7ffe92735e7c items=0 ppid=2992 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.545000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:29.548000 audit[3124]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=3124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:29.548000 audit[3124]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe92735e90 a2=0 a3=7ffe92735e7c items=0 ppid=2992 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:29.549000 audit[3129]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.549000 audit[3129]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe5b201ed0 a2=0 a3=7ffe5b201ebc items=0 ppid=2992 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 12:45:29.550000 audit[3131]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=3131 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.550000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff85ef3ab0 a2=0 a3=7fff85ef3a9c items=0 ppid=2992 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 12:45:29.565000 audit[3134]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=3134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.565000 audit[3134]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe48c9cb10 a2=0 a3=7ffe48c9cafc items=0 ppid=2992 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 12:45:29.566000 audit[3135]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=3135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.566000 audit[3135]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa68f0340 a2=0 a3=7fffa68f032c items=0 ppid=2992 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.566000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 12:45:29.567000 audit[3137]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.567000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff8a240680 a2=0 a3=7fff8a24066c items=0 ppid=2992 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 12:45:29.568000 audit[3138]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=3138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.568000 audit[3138]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeaf9cf050 a2=0 a3=7ffeaf9cf03c items=0 ppid=2992 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 12:45:29.569000 audit[3140]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.569000 audit[3140]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe9c864450 a2=0 a3=7ffe9c86443c items=0 ppid=2992 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 12:45:29.571000 audit[3143]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=3143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.571000 audit[3143]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdf9d249d0 a2=0 a3=7ffdf9d249bc items=0 ppid=2992 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 12:45:29.571000 audit[3144]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=3144 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.571000 audit[3144]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf9b11980 a2=0 a3=7ffcf9b1196c items=0 ppid=2992 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 12:45:29.573000 audit[3146]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=3146 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.573000 audit[3146]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffb5498070 a2=0 a3=7fffb549805c items=0 ppid=2992 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 12:45:29.573000 audit[3147]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=3147 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.573000 audit[3147]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9ba875d0 a2=0 a3=7fff9ba875bc items=0 ppid=2992 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 12:45:29.575000 audit[3149]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=3149 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.575000 audit[3149]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce1bf2630 a2=0 a3=7ffce1bf261c items=0 ppid=2992 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 12:45:29.577000 audit[3152]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=3152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.577000 audit[3152]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd4a32ddd0 a2=0 a3=7ffd4a32ddbc items=0 ppid=2992 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 12:45:29.579000 audit[3155]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=3155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.579000 audit[3155]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff61b3fab0 a2=0 a3=7fff61b3fa9c items=0 ppid=2992 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 12:45:29.580000 audit[3156]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=3156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.580000 audit[3156]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe2461e3d0 a2=0 a3=7ffe2461e3bc items=0 ppid=2992 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 12:45:29.581000 audit[3158]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=3158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.581000 audit[3158]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffce2399ef0 a2=0 a3=7ffce2399edc items=0 ppid=2992 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 12:45:29.584000 audit[3161]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=3161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:45:29.584000 audit[3161]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffa100f9d0 a2=0 a3=7fffa100f9bc items=0 ppid=2992 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 12:45:29.587000 audit[3165]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=3165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 12:45:29.587000 audit[3165]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffde670a3e0 a2=0 a3=7ffde670a3cc items=0 ppid=2992 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.587000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:29.588000 audit[3165]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=3165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 12:45:29.588000 audit[3165]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffde670a3e0 a2=0 a3=7ffde670a3cc items=0 ppid=2992 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:29.588000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:30.334795 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3324594898.mount: Deactivated successfully. Feb 9 12:45:30.941576 env[1555]: time="2024-02-09T12:45:30.941524607Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:30.942229 env[1555]: time="2024-02-09T12:45:30.942181092Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:30.943062 env[1555]: time="2024-02-09T12:45:30.943008569Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:30.943993 env[1555]: time="2024-02-09T12:45:30.943951638Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:30.944813 env[1555]: time="2024-02-09T12:45:30.944777604Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 12:45:30.945752 env[1555]: time="2024-02-09T12:45:30.945710177Z" level=info msg="CreateContainer within sandbox \"c718427627a9e00c5464b175211973110406e7ff750365cd8c7f2b1cb3a30bb7\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 12:45:30.949940 env[1555]: time="2024-02-09T12:45:30.949893952Z" level=info msg="CreateContainer within sandbox \"c718427627a9e00c5464b175211973110406e7ff750365cd8c7f2b1cb3a30bb7\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"b9f7b4b9ebd0b0b3875e2cbd875057a97d87c86e4bee36975f7030390c427245\"" Feb 9 12:45:30.950264 env[1555]: time="2024-02-09T12:45:30.950250755Z" level=info msg="StartContainer for \"b9f7b4b9ebd0b0b3875e2cbd875057a97d87c86e4bee36975f7030390c427245\"" Feb 9 12:45:31.004384 env[1555]: time="2024-02-09T12:45:31.004245803Z" level=info msg="StartContainer for \"b9f7b4b9ebd0b0b3875e2cbd875057a97d87c86e4bee36975f7030390c427245\" returns successfully" Feb 9 12:45:31.518201 kubelet[2728]: I0209 12:45:31.518111 2728 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-wqjql" podStartSLOduration=-9.22337203333675e+09 pod.CreationTimestamp="2024-02-09 12:45:28 +0000 UTC" firstStartedPulling="2024-02-09 12:45:28.993768787 +0000 UTC m=+15.712245597" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 12:45:31.517529396 +0000 UTC m=+18.236006292" watchObservedRunningTime="2024-02-09 12:45:31.51802636 +0000 UTC m=+18.236503224" Feb 9 12:45:32.683000 audit[3240]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:32.683000 audit[3240]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe1e798250 a2=0 a3=7ffe1e79823c items=0 ppid=2992 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:32.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:32.684000 audit[3240]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=3240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:32.684000 audit[3240]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe1e798250 a2=0 a3=7ffe1e79823c items=0 ppid=2992 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:32.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:32.740000 audit[3266]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3266 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:32.740000 audit[3266]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe3e6a35f0 a2=0 a3=7ffe3e6a35dc items=0 ppid=2992 pid=3266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:32.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:32.741000 audit[3266]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3266 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:32.741000 audit[3266]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe3e6a35f0 a2=0 a3=7ffe3e6a35dc items=0 ppid=2992 pid=3266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:32.741000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:32.816599 kubelet[2728]: I0209 12:45:32.816547 2728 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:45:32.849442 kubelet[2728]: I0209 12:45:32.849426 2728 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:45:32.867447 kubelet[2728]: I0209 12:45:32.867402 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9b09bd80-4f9d-49d2-ae9d-093a15f33e9a-tigera-ca-bundle\") pod \"calico-typha-78ff5f77c-cdsfs\" (UID: \"9b09bd80-4f9d-49d2-ae9d-093a15f33e9a\") " pod="calico-system/calico-typha-78ff5f77c-cdsfs" Feb 9 12:45:32.867447 kubelet[2728]: I0209 12:45:32.867434 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/9b09bd80-4f9d-49d2-ae9d-093a15f33e9a-typha-certs\") pod \"calico-typha-78ff5f77c-cdsfs\" (UID: \"9b09bd80-4f9d-49d2-ae9d-093a15f33e9a\") " pod="calico-system/calico-typha-78ff5f77c-cdsfs" Feb 9 12:45:32.867564 kubelet[2728]: I0209 12:45:32.867485 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jpbxf\" (UniqueName: \"kubernetes.io/projected/9b09bd80-4f9d-49d2-ae9d-093a15f33e9a-kube-api-access-jpbxf\") pod \"calico-typha-78ff5f77c-cdsfs\" (UID: \"9b09bd80-4f9d-49d2-ae9d-093a15f33e9a\") " pod="calico-system/calico-typha-78ff5f77c-cdsfs" Feb 9 12:45:32.968751 kubelet[2728]: I0209 12:45:32.968544 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/cb165092-95fb-4ad2-8687-438db41bbe96-cni-log-dir\") pod \"calico-node-grlp7\" (UID: \"cb165092-95fb-4ad2-8687-438db41bbe96\") " pod="calico-system/calico-node-grlp7" Feb 9 12:45:32.968751 kubelet[2728]: I0209 12:45:32.968741 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/cb165092-95fb-4ad2-8687-438db41bbe96-cni-bin-dir\") pod \"calico-node-grlp7\" (UID: \"cb165092-95fb-4ad2-8687-438db41bbe96\") " pod="calico-system/calico-node-grlp7" Feb 9 12:45:32.969092 kubelet[2728]: I0209 12:45:32.968882 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/cb165092-95fb-4ad2-8687-438db41bbe96-flexvol-driver-host\") pod \"calico-node-grlp7\" (UID: \"cb165092-95fb-4ad2-8687-438db41bbe96\") " pod="calico-system/calico-node-grlp7" Feb 9 12:45:32.969227 kubelet[2728]: I0209 12:45:32.969139 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cb165092-95fb-4ad2-8687-438db41bbe96-xtables-lock\") pod \"calico-node-grlp7\" (UID: \"cb165092-95fb-4ad2-8687-438db41bbe96\") " pod="calico-system/calico-node-grlp7" Feb 9 12:45:32.969436 kubelet[2728]: I0209 12:45:32.969244 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cb165092-95fb-4ad2-8687-438db41bbe96-lib-modules\") pod \"calico-node-grlp7\" (UID: \"cb165092-95fb-4ad2-8687-438db41bbe96\") " pod="calico-system/calico-node-grlp7" Feb 9 12:45:32.969634 kubelet[2728]: I0209 12:45:32.969465 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/cb165092-95fb-4ad2-8687-438db41bbe96-var-run-calico\") pod \"calico-node-grlp7\" (UID: \"cb165092-95fb-4ad2-8687-438db41bbe96\") " pod="calico-system/calico-node-grlp7" Feb 9 12:45:32.969634 kubelet[2728]: I0209 12:45:32.969589 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cb165092-95fb-4ad2-8687-438db41bbe96-var-lib-calico\") pod \"calico-node-grlp7\" (UID: \"cb165092-95fb-4ad2-8687-438db41bbe96\") " pod="calico-system/calico-node-grlp7" Feb 9 12:45:32.969898 kubelet[2728]: I0209 12:45:32.969745 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jfv8j\" (UniqueName: \"kubernetes.io/projected/cb165092-95fb-4ad2-8687-438db41bbe96-kube-api-access-jfv8j\") pod \"calico-node-grlp7\" (UID: \"cb165092-95fb-4ad2-8687-438db41bbe96\") " pod="calico-system/calico-node-grlp7" Feb 9 12:45:32.970051 kubelet[2728]: I0209 12:45:32.969961 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cb165092-95fb-4ad2-8687-438db41bbe96-tigera-ca-bundle\") pod \"calico-node-grlp7\" (UID: \"cb165092-95fb-4ad2-8687-438db41bbe96\") " pod="calico-system/calico-node-grlp7" Feb 9 12:45:32.970218 kubelet[2728]: I0209 12:45:32.970084 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/cb165092-95fb-4ad2-8687-438db41bbe96-node-certs\") pod \"calico-node-grlp7\" (UID: \"cb165092-95fb-4ad2-8687-438db41bbe96\") " pod="calico-system/calico-node-grlp7" Feb 9 12:45:32.970387 kubelet[2728]: I0209 12:45:32.970357 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/cb165092-95fb-4ad2-8687-438db41bbe96-policysync\") pod \"calico-node-grlp7\" (UID: \"cb165092-95fb-4ad2-8687-438db41bbe96\") " pod="calico-system/calico-node-grlp7" Feb 9 12:45:32.970648 kubelet[2728]: I0209 12:45:32.970594 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/cb165092-95fb-4ad2-8687-438db41bbe96-cni-net-dir\") pod \"calico-node-grlp7\" (UID: \"cb165092-95fb-4ad2-8687-438db41bbe96\") " pod="calico-system/calico-node-grlp7" Feb 9 12:45:32.992124 kubelet[2728]: I0209 12:45:32.992057 2728 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:45:32.992787 kubelet[2728]: E0209 12:45:32.992747 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:45:33.071092 kubelet[2728]: I0209 12:45:33.071045 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/3d7559de-a11a-443c-bbd2-21f3384d343f-socket-dir\") pod \"csi-node-driver-2lnwr\" (UID: \"3d7559de-a11a-443c-bbd2-21f3384d343f\") " pod="calico-system/csi-node-driver-2lnwr" Feb 9 12:45:33.071191 kubelet[2728]: I0209 12:45:33.071134 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/3d7559de-a11a-443c-bbd2-21f3384d343f-kubelet-dir\") pod \"csi-node-driver-2lnwr\" (UID: \"3d7559de-a11a-443c-bbd2-21f3384d343f\") " pod="calico-system/csi-node-driver-2lnwr" Feb 9 12:45:33.071324 kubelet[2728]: I0209 12:45:33.071312 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hkj7h\" (UniqueName: \"kubernetes.io/projected/3d7559de-a11a-443c-bbd2-21f3384d343f-kube-api-access-hkj7h\") pod \"csi-node-driver-2lnwr\" (UID: \"3d7559de-a11a-443c-bbd2-21f3384d343f\") " pod="calico-system/csi-node-driver-2lnwr" Feb 9 12:45:33.071544 kubelet[2728]: E0209 12:45:33.071510 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.071544 kubelet[2728]: W0209 12:45:33.071520 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.071544 kubelet[2728]: E0209 12:45:33.071536 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.071797 kubelet[2728]: E0209 12:45:33.071756 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.071797 kubelet[2728]: W0209 12:45:33.071763 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.071797 kubelet[2728]: E0209 12:45:33.071777 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.071889 kubelet[2728]: E0209 12:45:33.071880 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.071889 kubelet[2728]: W0209 12:45:33.071885 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.071932 kubelet[2728]: E0209 12:45:33.071894 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.072033 kubelet[2728]: E0209 12:45:33.071998 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.072033 kubelet[2728]: W0209 12:45:33.072003 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.072033 kubelet[2728]: E0209 12:45:33.072011 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.072175 kubelet[2728]: E0209 12:45:33.072142 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.072175 kubelet[2728]: W0209 12:45:33.072153 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.072175 kubelet[2728]: E0209 12:45:33.072169 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.072279 kubelet[2728]: E0209 12:45:33.072272 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.072306 kubelet[2728]: W0209 12:45:33.072281 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.072306 kubelet[2728]: E0209 12:45:33.072295 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.072440 kubelet[2728]: E0209 12:45:33.072433 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.072440 kubelet[2728]: W0209 12:45:33.072439 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.072497 kubelet[2728]: E0209 12:45:33.072449 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.072541 kubelet[2728]: E0209 12:45:33.072535 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.072565 kubelet[2728]: W0209 12:45:33.072541 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.072565 kubelet[2728]: E0209 12:45:33.072548 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.072648 kubelet[2728]: E0209 12:45:33.072641 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.072673 kubelet[2728]: W0209 12:45:33.072648 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.072673 kubelet[2728]: E0209 12:45:33.072660 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.072783 kubelet[2728]: E0209 12:45:33.072777 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.072807 kubelet[2728]: W0209 12:45:33.072787 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.072807 kubelet[2728]: E0209 12:45:33.072797 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.072879 kubelet[2728]: E0209 12:45:33.072873 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.072879 kubelet[2728]: W0209 12:45:33.072879 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.072925 kubelet[2728]: E0209 12:45:33.072886 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.072985 kubelet[2728]: E0209 12:45:33.072977 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.072985 kubelet[2728]: W0209 12:45:33.072985 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.073046 kubelet[2728]: E0209 12:45:33.072995 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.073102 kubelet[2728]: E0209 12:45:33.073094 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.073127 kubelet[2728]: W0209 12:45:33.073103 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.073127 kubelet[2728]: E0209 12:45:33.073118 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.073171 kubelet[2728]: I0209 12:45:33.073143 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/3d7559de-a11a-443c-bbd2-21f3384d343f-varrun\") pod \"csi-node-driver-2lnwr\" (UID: \"3d7559de-a11a-443c-bbd2-21f3384d343f\") " pod="calico-system/csi-node-driver-2lnwr" Feb 9 12:45:33.073242 kubelet[2728]: E0209 12:45:33.073236 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.073269 kubelet[2728]: W0209 12:45:33.073242 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.073269 kubelet[2728]: E0209 12:45:33.073265 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.073377 kubelet[2728]: E0209 12:45:33.073371 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.073406 kubelet[2728]: W0209 12:45:33.073379 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.073406 kubelet[2728]: E0209 12:45:33.073397 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.073505 kubelet[2728]: E0209 12:45:33.073498 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.073552 kubelet[2728]: W0209 12:45:33.073506 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.073552 kubelet[2728]: E0209 12:45:33.073519 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.073629 kubelet[2728]: E0209 12:45:33.073622 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.073654 kubelet[2728]: W0209 12:45:33.073631 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.073654 kubelet[2728]: E0209 12:45:33.073644 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.073787 kubelet[2728]: E0209 12:45:33.073778 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.073823 kubelet[2728]: W0209 12:45:33.073787 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.073823 kubelet[2728]: E0209 12:45:33.073801 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.073912 kubelet[2728]: E0209 12:45:33.073905 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.073936 kubelet[2728]: W0209 12:45:33.073913 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.073936 kubelet[2728]: E0209 12:45:33.073927 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.074048 kubelet[2728]: E0209 12:45:33.074042 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.074072 kubelet[2728]: W0209 12:45:33.074050 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.074072 kubelet[2728]: E0209 12:45:33.074061 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.074149 kubelet[2728]: E0209 12:45:33.074143 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.074149 kubelet[2728]: W0209 12:45:33.074149 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.074193 kubelet[2728]: E0209 12:45:33.074163 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.074245 kubelet[2728]: E0209 12:45:33.074240 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.074245 kubelet[2728]: W0209 12:45:33.074245 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.074296 kubelet[2728]: E0209 12:45:33.074257 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.074325 kubelet[2728]: E0209 12:45:33.074319 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.074351 kubelet[2728]: W0209 12:45:33.074325 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.074351 kubelet[2728]: E0209 12:45:33.074336 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.074421 kubelet[2728]: E0209 12:45:33.074414 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.074446 kubelet[2728]: W0209 12:45:33.074422 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.074446 kubelet[2728]: E0209 12:45:33.074433 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.074519 kubelet[2728]: E0209 12:45:33.074513 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.074519 kubelet[2728]: W0209 12:45:33.074518 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.074563 kubelet[2728]: E0209 12:45:33.074526 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.074618 kubelet[2728]: E0209 12:45:33.074613 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.074618 kubelet[2728]: W0209 12:45:33.074618 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.074667 kubelet[2728]: E0209 12:45:33.074628 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.074716 kubelet[2728]: E0209 12:45:33.074709 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.074740 kubelet[2728]: W0209 12:45:33.074717 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.074740 kubelet[2728]: E0209 12:45:33.074729 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.074867 kubelet[2728]: E0209 12:45:33.074860 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.074892 kubelet[2728]: W0209 12:45:33.074868 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.074892 kubelet[2728]: E0209 12:45:33.074881 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.074939 kubelet[2728]: I0209 12:45:33.074900 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/3d7559de-a11a-443c-bbd2-21f3384d343f-registration-dir\") pod \"csi-node-driver-2lnwr\" (UID: \"3d7559de-a11a-443c-bbd2-21f3384d343f\") " pod="calico-system/csi-node-driver-2lnwr" Feb 9 12:45:33.075019 kubelet[2728]: E0209 12:45:33.075012 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.075044 kubelet[2728]: W0209 12:45:33.075019 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.075044 kubelet[2728]: E0209 12:45:33.075030 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.075141 kubelet[2728]: E0209 12:45:33.075135 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.075141 kubelet[2728]: W0209 12:45:33.075141 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.075200 kubelet[2728]: E0209 12:45:33.075149 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.130711 env[1555]: time="2024-02-09T12:45:33.130639802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-78ff5f77c-cdsfs,Uid:9b09bd80-4f9d-49d2-ae9d-093a15f33e9a,Namespace:calico-system,Attempt:0,}" Feb 9 12:45:33.175651 kubelet[2728]: E0209 12:45:33.175606 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.175651 kubelet[2728]: W0209 12:45:33.175620 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.175651 kubelet[2728]: E0209 12:45:33.175637 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.175881 kubelet[2728]: E0209 12:45:33.175836 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.175881 kubelet[2728]: W0209 12:45:33.175845 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.175881 kubelet[2728]: E0209 12:45:33.175858 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.176066 kubelet[2728]: E0209 12:45:33.176032 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.176066 kubelet[2728]: W0209 12:45:33.176042 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.176066 kubelet[2728]: E0209 12:45:33.176062 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.176229 kubelet[2728]: E0209 12:45:33.176218 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.176229 kubelet[2728]: W0209 12:45:33.176225 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.176328 kubelet[2728]: E0209 12:45:33.176237 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.176375 kubelet[2728]: E0209 12:45:33.176367 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.176435 kubelet[2728]: W0209 12:45:33.176375 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.176435 kubelet[2728]: E0209 12:45:33.176400 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.176559 kubelet[2728]: E0209 12:45:33.176548 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.176559 kubelet[2728]: W0209 12:45:33.176557 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.176652 kubelet[2728]: E0209 12:45:33.176570 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.176758 kubelet[2728]: E0209 12:45:33.176748 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.176758 kubelet[2728]: W0209 12:45:33.176755 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.176862 kubelet[2728]: E0209 12:45:33.176765 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.176862 kubelet[2728]: E0209 12:45:33.176857 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.176862 kubelet[2728]: W0209 12:45:33.176863 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.176994 kubelet[2728]: E0209 12:45:33.176882 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.176994 kubelet[2728]: E0209 12:45:33.176965 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.176994 kubelet[2728]: W0209 12:45:33.176971 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.176994 kubelet[2728]: E0209 12:45:33.176985 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.177101 kubelet[2728]: E0209 12:45:33.177063 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.177101 kubelet[2728]: W0209 12:45:33.177069 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.177101 kubelet[2728]: E0209 12:45:33.177080 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.177177 kubelet[2728]: E0209 12:45:33.177166 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.177177 kubelet[2728]: W0209 12:45:33.177172 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.177231 kubelet[2728]: E0209 12:45:33.177181 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.177270 kubelet[2728]: E0209 12:45:33.177263 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.177270 kubelet[2728]: W0209 12:45:33.177269 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.177323 kubelet[2728]: E0209 12:45:33.177286 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.177384 kubelet[2728]: E0209 12:45:33.177377 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.177384 kubelet[2728]: W0209 12:45:33.177383 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.177456 kubelet[2728]: E0209 12:45:33.177407 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.177493 kubelet[2728]: E0209 12:45:33.177486 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.177524 kubelet[2728]: W0209 12:45:33.177492 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.177524 kubelet[2728]: E0209 12:45:33.177507 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.177589 kubelet[2728]: E0209 12:45:33.177583 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.177589 kubelet[2728]: W0209 12:45:33.177589 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.177661 kubelet[2728]: E0209 12:45:33.177601 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.177729 kubelet[2728]: E0209 12:45:33.177722 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.177729 kubelet[2728]: W0209 12:45:33.177729 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.177781 kubelet[2728]: E0209 12:45:33.177738 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.177848 kubelet[2728]: E0209 12:45:33.177842 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.177886 kubelet[2728]: W0209 12:45:33.177848 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.177886 kubelet[2728]: E0209 12:45:33.177857 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.177966 kubelet[2728]: E0209 12:45:33.177959 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.177966 kubelet[2728]: W0209 12:45:33.177966 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.178028 kubelet[2728]: E0209 12:45:33.177975 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.178143 kubelet[2728]: E0209 12:45:33.178135 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.178143 kubelet[2728]: W0209 12:45:33.178142 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.178210 kubelet[2728]: E0209 12:45:33.178152 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.178315 kubelet[2728]: E0209 12:45:33.178308 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.178315 kubelet[2728]: W0209 12:45:33.178315 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.178372 kubelet[2728]: E0209 12:45:33.178327 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.178438 kubelet[2728]: E0209 12:45:33.178431 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.178438 kubelet[2728]: W0209 12:45:33.178437 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.178500 kubelet[2728]: E0209 12:45:33.178447 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.178552 kubelet[2728]: E0209 12:45:33.178545 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.178584 kubelet[2728]: W0209 12:45:33.178553 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.178613 kubelet[2728]: E0209 12:45:33.178584 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.178686 kubelet[2728]: E0209 12:45:33.178680 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.178718 kubelet[2728]: W0209 12:45:33.178686 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.178718 kubelet[2728]: E0209 12:45:33.178695 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.178788 kubelet[2728]: E0209 12:45:33.178782 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.178816 kubelet[2728]: W0209 12:45:33.178788 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.178816 kubelet[2728]: E0209 12:45:33.178797 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.178981 kubelet[2728]: E0209 12:45:33.178973 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.179013 kubelet[2728]: W0209 12:45:33.178982 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.179013 kubelet[2728]: E0209 12:45:33.178995 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.179105 kubelet[2728]: E0209 12:45:33.179098 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.179134 kubelet[2728]: W0209 12:45:33.179105 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.179134 kubelet[2728]: E0209 12:45:33.179114 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.278229 kubelet[2728]: E0209 12:45:33.278087 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.278229 kubelet[2728]: W0209 12:45:33.278122 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.278229 kubelet[2728]: E0209 12:45:33.278162 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.278736 kubelet[2728]: E0209 12:45:33.278657 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.278736 kubelet[2728]: W0209 12:45:33.278686 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.278736 kubelet[2728]: E0209 12:45:33.278721 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.379984 kubelet[2728]: E0209 12:45:33.379940 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.379984 kubelet[2728]: W0209 12:45:33.379954 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.379984 kubelet[2728]: E0209 12:45:33.379969 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.380151 kubelet[2728]: E0209 12:45:33.380119 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.380151 kubelet[2728]: W0209 12:45:33.380125 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.380151 kubelet[2728]: E0209 12:45:33.380133 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.451719 kubelet[2728]: E0209 12:45:33.451662 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.451719 kubelet[2728]: W0209 12:45:33.451708 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.452164 kubelet[2728]: E0209 12:45:33.451772 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.480900 kubelet[2728]: E0209 12:45:33.480864 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.480900 kubelet[2728]: W0209 12:45:33.480892 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.481154 kubelet[2728]: E0209 12:45:33.480923 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.525525 env[1555]: time="2024-02-09T12:45:33.525423208Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:45:33.525525 env[1555]: time="2024-02-09T12:45:33.525496019Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:45:33.525847 env[1555]: time="2024-02-09T12:45:33.525523516Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:45:33.525972 env[1555]: time="2024-02-09T12:45:33.525796327Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1082567b640e75d4447f9ef5f9096cd2da1e174589e46eda2c1036813349b313 pid=3346 runtime=io.containerd.runc.v2 Feb 9 12:45:33.582372 kubelet[2728]: E0209 12:45:33.582310 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.582372 kubelet[2728]: W0209 12:45:33.582325 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.582372 kubelet[2728]: E0209 12:45:33.582343 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.615157 env[1555]: time="2024-02-09T12:45:33.615068329Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-78ff5f77c-cdsfs,Uid:9b09bd80-4f9d-49d2-ae9d-093a15f33e9a,Namespace:calico-system,Attempt:0,} returns sandbox id \"1082567b640e75d4447f9ef5f9096cd2da1e174589e46eda2c1036813349b313\"" Feb 9 12:45:33.617207 env[1555]: time="2024-02-09T12:45:33.617159024Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 12:45:33.645287 kubelet[2728]: E0209 12:45:33.645224 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:33.645287 kubelet[2728]: W0209 12:45:33.645252 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:33.645287 kubelet[2728]: E0209 12:45:33.645284 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:33.752931 env[1555]: time="2024-02-09T12:45:33.752786235Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-grlp7,Uid:cb165092-95fb-4ad2-8687-438db41bbe96,Namespace:calico-system,Attempt:0,}" Feb 9 12:45:33.793849 env[1555]: time="2024-02-09T12:45:33.793664809Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:45:33.793849 env[1555]: time="2024-02-09T12:45:33.793778267Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:45:33.793849 env[1555]: time="2024-02-09T12:45:33.793822280Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:45:33.794333 env[1555]: time="2024-02-09T12:45:33.794223887Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/657e0b922938a09bf0b213e3b76995abaf0714d21e6b135a72ac36c9b1e9b8f1 pid=3398 runtime=io.containerd.runc.v2 Feb 9 12:45:33.842000 audit[3434]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:33.869436 kernel: kauditd_printk_skb: 134 callbacks suppressed Feb 9 12:45:33.869543 kernel: audit: type=1325 audit(1707482733.842:279): table=filter:107 family=2 entries=14 op=nft_register_rule pid=3434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:33.842000 audit[3434]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffcabe8b9f0 a2=0 a3=7ffcabe8b9dc items=0 ppid=2992 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:34.025724 kernel: audit: type=1300 audit(1707482733.842:279): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffcabe8b9f0 a2=0 a3=7ffcabe8b9dc items=0 ppid=2992 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:34.025798 kernel: audit: type=1327 audit(1707482733.842:279): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:33.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:34.085000 audit[3434]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=3434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:34.085000 audit[3434]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffcabe8b9f0 a2=0 a3=7ffcabe8b9dc items=0 ppid=2992 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:34.243717 kernel: audit: type=1325 audit(1707482734.085:280): table=nat:108 family=2 entries=20 op=nft_register_rule pid=3434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:34.243812 kernel: audit: type=1300 audit(1707482734.085:280): arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffcabe8b9f0 a2=0 a3=7ffcabe8b9dc items=0 ppid=2992 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:34.243856 kernel: audit: type=1327 audit(1707482734.085:280): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:34.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:34.245514 env[1555]: time="2024-02-09T12:45:34.245489982Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-grlp7,Uid:cb165092-95fb-4ad2-8687-438db41bbe96,Namespace:calico-system,Attempt:0,} returns sandbox id \"657e0b922938a09bf0b213e3b76995abaf0714d21e6b135a72ac36c9b1e9b8f1\"" Feb 9 12:45:34.459541 kubelet[2728]: E0209 12:45:34.459450 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:45:36.459711 kubelet[2728]: E0209 12:45:36.459657 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:45:37.843365 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2288411740.mount: Deactivated successfully. Feb 9 12:45:38.460502 kubelet[2728]: E0209 12:45:38.460413 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:45:40.460588 kubelet[2728]: E0209 12:45:40.460463 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:45:42.459767 kubelet[2728]: E0209 12:45:42.459722 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:45:44.459739 kubelet[2728]: E0209 12:45:44.459677 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:45:46.459052 kubelet[2728]: E0209 12:45:46.459027 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:45:46.900080 env[1555]: time="2024-02-09T12:45:46.900000578Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:46.900679 env[1555]: time="2024-02-09T12:45:46.900638981Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:46.902114 env[1555]: time="2024-02-09T12:45:46.902068353Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:46.902980 env[1555]: time="2024-02-09T12:45:46.902938702Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:45:46.903489 env[1555]: time="2024-02-09T12:45:46.903435358Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 12:45:46.903791 env[1555]: time="2024-02-09T12:45:46.903735502Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 12:45:46.907895 env[1555]: time="2024-02-09T12:45:46.907852045Z" level=info msg="CreateContainer within sandbox \"1082567b640e75d4447f9ef5f9096cd2da1e174589e46eda2c1036813349b313\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 12:45:46.911871 env[1555]: time="2024-02-09T12:45:46.911828038Z" level=info msg="CreateContainer within sandbox \"1082567b640e75d4447f9ef5f9096cd2da1e174589e46eda2c1036813349b313\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0a3667ae802fa6c60c21a35f83f495b888cc5d3d8dd11b27603525c844ce30b6\"" Feb 9 12:45:46.912118 env[1555]: time="2024-02-09T12:45:46.912087621Z" level=info msg="StartContainer for \"0a3667ae802fa6c60c21a35f83f495b888cc5d3d8dd11b27603525c844ce30b6\"" Feb 9 12:45:46.968634 env[1555]: time="2024-02-09T12:45:46.968609827Z" level=info msg="StartContainer for \"0a3667ae802fa6c60c21a35f83f495b888cc5d3d8dd11b27603525c844ce30b6\" returns successfully" Feb 9 12:45:47.550995 kubelet[2728]: E0209 12:45:47.550899 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.550995 kubelet[2728]: W0209 12:45:47.550945 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.550995 kubelet[2728]: E0209 12:45:47.551003 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.552135 kubelet[2728]: E0209 12:45:47.551510 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.552135 kubelet[2728]: W0209 12:45:47.551535 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.552135 kubelet[2728]: E0209 12:45:47.551574 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.552135 kubelet[2728]: E0209 12:45:47.551986 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.552135 kubelet[2728]: W0209 12:45:47.552018 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.552135 kubelet[2728]: E0209 12:45:47.552053 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.552825 kubelet[2728]: E0209 12:45:47.552574 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.552825 kubelet[2728]: W0209 12:45:47.552598 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.552825 kubelet[2728]: E0209 12:45:47.552629 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.553107 kubelet[2728]: E0209 12:45:47.553061 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.553107 kubelet[2728]: W0209 12:45:47.553083 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.553311 kubelet[2728]: E0209 12:45:47.553115 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.553574 kubelet[2728]: E0209 12:45:47.553503 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.553574 kubelet[2728]: W0209 12:45:47.553528 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.553574 kubelet[2728]: E0209 12:45:47.553558 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.554141 kubelet[2728]: E0209 12:45:47.554073 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.554141 kubelet[2728]: W0209 12:45:47.554098 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.554141 kubelet[2728]: E0209 12:45:47.554130 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.554608 kubelet[2728]: E0209 12:45:47.554515 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.554608 kubelet[2728]: W0209 12:45:47.554537 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.554608 kubelet[2728]: E0209 12:45:47.554567 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.555023 kubelet[2728]: E0209 12:45:47.554957 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.555023 kubelet[2728]: W0209 12:45:47.554978 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.555023 kubelet[2728]: E0209 12:45:47.555006 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.555466 kubelet[2728]: E0209 12:45:47.555379 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.555466 kubelet[2728]: W0209 12:45:47.555418 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.555466 kubelet[2728]: E0209 12:45:47.555448 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.555935 kubelet[2728]: E0209 12:45:47.555862 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.555935 kubelet[2728]: W0209 12:45:47.555895 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.555935 kubelet[2728]: E0209 12:45:47.555934 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.556357 kubelet[2728]: E0209 12:45:47.556306 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.556357 kubelet[2728]: W0209 12:45:47.556329 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.556357 kubelet[2728]: E0209 12:45:47.556360 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.563922 kubelet[2728]: I0209 12:45:47.563874 2728 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-78ff5f77c-cdsfs" podStartSLOduration=-9.223372021290983e+09 pod.CreationTimestamp="2024-02-09 12:45:32 +0000 UTC" firstStartedPulling="2024-02-09 12:45:33.616642476 +0000 UTC m=+20.335119315" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 12:45:47.563049319 +0000 UTC m=+34.281526197" watchObservedRunningTime="2024-02-09 12:45:47.563792767 +0000 UTC m=+34.282269626" Feb 9 12:45:47.581347 kubelet[2728]: E0209 12:45:47.581245 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.581347 kubelet[2728]: W0209 12:45:47.581298 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.581347 kubelet[2728]: E0209 12:45:47.581346 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.582008 kubelet[2728]: E0209 12:45:47.581933 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.582008 kubelet[2728]: W0209 12:45:47.581967 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.582008 kubelet[2728]: E0209 12:45:47.582016 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.582618 kubelet[2728]: E0209 12:45:47.582578 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.582618 kubelet[2728]: W0209 12:45:47.582613 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.582854 kubelet[2728]: E0209 12:45:47.582659 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.583255 kubelet[2728]: E0209 12:45:47.583179 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.583255 kubelet[2728]: W0209 12:45:47.583220 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.583704 kubelet[2728]: E0209 12:45:47.583287 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.584035 kubelet[2728]: E0209 12:45:47.583919 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.584035 kubelet[2728]: W0209 12:45:47.583973 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.584035 kubelet[2728]: E0209 12:45:47.584036 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.584839 kubelet[2728]: E0209 12:45:47.584771 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.584839 kubelet[2728]: W0209 12:45:47.584812 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.585190 kubelet[2728]: E0209 12:45:47.584933 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.585364 kubelet[2728]: E0209 12:45:47.585333 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.585576 kubelet[2728]: W0209 12:45:47.585376 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.585738 kubelet[2728]: E0209 12:45:47.585571 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.585991 kubelet[2728]: E0209 12:45:47.585949 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.586160 kubelet[2728]: W0209 12:45:47.585997 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.586160 kubelet[2728]: E0209 12:45:47.586104 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.586592 kubelet[2728]: E0209 12:45:47.586554 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.586786 kubelet[2728]: W0209 12:45:47.586593 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.586786 kubelet[2728]: E0209 12:45:47.586684 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.587127 kubelet[2728]: E0209 12:45:47.587099 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.587277 kubelet[2728]: W0209 12:45:47.587132 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.587277 kubelet[2728]: E0209 12:45:47.587192 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.587679 kubelet[2728]: E0209 12:45:47.587658 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.587867 kubelet[2728]: W0209 12:45:47.587690 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.587867 kubelet[2728]: E0209 12:45:47.587817 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.588145 kubelet[2728]: E0209 12:45:47.588115 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.588306 kubelet[2728]: W0209 12:45:47.588146 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.588306 kubelet[2728]: E0209 12:45:47.588270 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.588706 kubelet[2728]: E0209 12:45:47.588646 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.588706 kubelet[2728]: W0209 12:45:47.588683 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.589038 kubelet[2728]: E0209 12:45:47.588770 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.589284 kubelet[2728]: E0209 12:45:47.589241 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.589284 kubelet[2728]: W0209 12:45:47.589281 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.589678 kubelet[2728]: E0209 12:45:47.589343 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.589987 kubelet[2728]: E0209 12:45:47.589944 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.590190 kubelet[2728]: W0209 12:45:47.589987 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.590190 kubelet[2728]: E0209 12:45:47.590054 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.590649 kubelet[2728]: E0209 12:45:47.590611 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.590842 kubelet[2728]: W0209 12:45:47.590650 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.590842 kubelet[2728]: E0209 12:45:47.590715 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.591601 kubelet[2728]: E0209 12:45:47.591295 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.591601 kubelet[2728]: W0209 12:45:47.591330 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.591601 kubelet[2728]: E0209 12:45:47.591370 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.592254 kubelet[2728]: E0209 12:45:47.591931 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:47.592254 kubelet[2728]: W0209 12:45:47.591970 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:47.592254 kubelet[2728]: E0209 12:45:47.592025 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:47.639000 audit[3570]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=3570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:47.639000 audit[3570]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffcddac21e0 a2=0 a3=7ffcddac21cc items=0 ppid=2992 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:47.799236 kernel: audit: type=1325 audit(1707482747.639:281): table=filter:109 family=2 entries=13 op=nft_register_rule pid=3570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:47.799266 kernel: audit: type=1300 audit(1707482747.639:281): arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffcddac21e0 a2=0 a3=7ffcddac21cc items=0 ppid=2992 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:47.799279 kernel: audit: type=1327 audit(1707482747.639:281): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:47.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:47.640000 audit[3570]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=3570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:47.640000 audit[3570]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffcddac21e0 a2=0 a3=7ffcddac21cc items=0 ppid=2992 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:48.019591 kernel: audit: type=1325 audit(1707482747.640:282): table=nat:110 family=2 entries=27 op=nft_register_chain pid=3570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:45:48.019618 kernel: audit: type=1300 audit(1707482747.640:282): arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffcddac21e0 a2=0 a3=7ffcddac21cc items=0 ppid=2992 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:48.019633 kernel: audit: type=1327 audit(1707482747.640:282): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:47.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:45:48.459690 kubelet[2728]: E0209 12:45:48.459620 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:45:48.563305 kubelet[2728]: E0209 12:45:48.563240 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.563305 kubelet[2728]: W0209 12:45:48.563287 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.564341 kubelet[2728]: E0209 12:45:48.563338 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.564341 kubelet[2728]: E0209 12:45:48.563878 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.564341 kubelet[2728]: W0209 12:45:48.563910 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.564341 kubelet[2728]: E0209 12:45:48.563950 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.564809 kubelet[2728]: E0209 12:45:48.564487 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.564809 kubelet[2728]: W0209 12:45:48.564521 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.564809 kubelet[2728]: E0209 12:45:48.564559 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.565144 kubelet[2728]: E0209 12:45:48.565108 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.565144 kubelet[2728]: W0209 12:45:48.565144 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.565413 kubelet[2728]: E0209 12:45:48.565183 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.565810 kubelet[2728]: E0209 12:45:48.565721 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.565810 kubelet[2728]: W0209 12:45:48.565755 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.565810 kubelet[2728]: E0209 12:45:48.565793 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.566352 kubelet[2728]: E0209 12:45:48.566315 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.566352 kubelet[2728]: W0209 12:45:48.566349 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.566641 kubelet[2728]: E0209 12:45:48.566406 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.567131 kubelet[2728]: E0209 12:45:48.567042 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.567131 kubelet[2728]: W0209 12:45:48.567077 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.567131 kubelet[2728]: E0209 12:45:48.567116 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.567748 kubelet[2728]: E0209 12:45:48.567653 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.567748 kubelet[2728]: W0209 12:45:48.567686 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.567748 kubelet[2728]: E0209 12:45:48.567726 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.568340 kubelet[2728]: E0209 12:45:48.568269 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.568340 kubelet[2728]: W0209 12:45:48.568305 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.568340 kubelet[2728]: E0209 12:45:48.568347 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.568997 kubelet[2728]: E0209 12:45:48.568908 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.568997 kubelet[2728]: W0209 12:45:48.568942 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.568997 kubelet[2728]: E0209 12:45:48.568981 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.569583 kubelet[2728]: E0209 12:45:48.569496 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.569583 kubelet[2728]: W0209 12:45:48.569522 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.569583 kubelet[2728]: E0209 12:45:48.569555 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.570111 kubelet[2728]: E0209 12:45:48.570040 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.570111 kubelet[2728]: W0209 12:45:48.570075 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.570111 kubelet[2728]: E0209 12:45:48.570115 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.593005 kubelet[2728]: E0209 12:45:48.592913 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.593005 kubelet[2728]: W0209 12:45:48.592961 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.593005 kubelet[2728]: E0209 12:45:48.593009 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.593672 kubelet[2728]: E0209 12:45:48.593584 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.593672 kubelet[2728]: W0209 12:45:48.593618 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.593672 kubelet[2728]: E0209 12:45:48.593665 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.594300 kubelet[2728]: E0209 12:45:48.594230 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.594300 kubelet[2728]: W0209 12:45:48.594265 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.594595 kubelet[2728]: E0209 12:45:48.594312 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.594930 kubelet[2728]: E0209 12:45:48.594841 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.594930 kubelet[2728]: W0209 12:45:48.594875 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.594930 kubelet[2728]: E0209 12:45:48.594922 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.595461 kubelet[2728]: E0209 12:45:48.595427 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.595461 kubelet[2728]: W0209 12:45:48.595455 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.595735 kubelet[2728]: E0209 12:45:48.595594 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.595981 kubelet[2728]: E0209 12:45:48.595937 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.595981 kubelet[2728]: W0209 12:45:48.595970 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.596306 kubelet[2728]: E0209 12:45:48.596107 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.596530 kubelet[2728]: E0209 12:45:48.596488 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.596530 kubelet[2728]: W0209 12:45:48.596515 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.596824 kubelet[2728]: E0209 12:45:48.596644 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.597120 kubelet[2728]: E0209 12:45:48.597051 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.597120 kubelet[2728]: W0209 12:45:48.597083 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.597363 kubelet[2728]: E0209 12:45:48.597133 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.597911 kubelet[2728]: E0209 12:45:48.597822 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.597911 kubelet[2728]: W0209 12:45:48.597855 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.597911 kubelet[2728]: E0209 12:45:48.597903 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.598542 kubelet[2728]: E0209 12:45:48.598458 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.598542 kubelet[2728]: W0209 12:45:48.598485 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.598861 kubelet[2728]: E0209 12:45:48.598600 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.599004 kubelet[2728]: E0209 12:45:48.598982 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.599122 kubelet[2728]: W0209 12:45:48.599015 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.599251 kubelet[2728]: E0209 12:45:48.599150 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.599570 kubelet[2728]: E0209 12:45:48.599539 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.599570 kubelet[2728]: W0209 12:45:48.599567 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.599815 kubelet[2728]: E0209 12:45:48.599682 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.600138 kubelet[2728]: E0209 12:45:48.600070 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.600138 kubelet[2728]: W0209 12:45:48.600104 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.600386 kubelet[2728]: E0209 12:45:48.600150 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.600810 kubelet[2728]: E0209 12:45:48.600719 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.600810 kubelet[2728]: W0209 12:45:48.600755 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.601131 kubelet[2728]: E0209 12:45:48.600893 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.601285 kubelet[2728]: E0209 12:45:48.601249 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.601285 kubelet[2728]: W0209 12:45:48.601273 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.601544 kubelet[2728]: E0209 12:45:48.601315 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.601953 kubelet[2728]: E0209 12:45:48.601867 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.601953 kubelet[2728]: W0209 12:45:48.601903 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.601953 kubelet[2728]: E0209 12:45:48.601944 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.602749 kubelet[2728]: E0209 12:45:48.602673 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.602749 kubelet[2728]: W0209 12:45:48.602709 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.602749 kubelet[2728]: E0209 12:45:48.602751 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:48.603300 kubelet[2728]: E0209 12:45:48.603273 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:48.603300 kubelet[2728]: W0209 12:45:48.603299 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:48.603546 kubelet[2728]: E0209 12:45:48.603334 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.577537 kubelet[2728]: E0209 12:45:49.577447 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.577537 kubelet[2728]: W0209 12:45:49.577488 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.577537 kubelet[2728]: E0209 12:45:49.577536 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.578657 kubelet[2728]: E0209 12:45:49.578057 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.578657 kubelet[2728]: W0209 12:45:49.578090 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.578657 kubelet[2728]: E0209 12:45:49.578128 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.579035 kubelet[2728]: E0209 12:45:49.578670 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.579035 kubelet[2728]: W0209 12:45:49.578704 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.579035 kubelet[2728]: E0209 12:45:49.578747 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.579349 kubelet[2728]: E0209 12:45:49.579308 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.579349 kubelet[2728]: W0209 12:45:49.579342 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.579572 kubelet[2728]: E0209 12:45:49.579381 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.580000 kubelet[2728]: E0209 12:45:49.579909 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.580000 kubelet[2728]: W0209 12:45:49.579943 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.580000 kubelet[2728]: E0209 12:45:49.579982 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.580558 kubelet[2728]: E0209 12:45:49.580485 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.580558 kubelet[2728]: W0209 12:45:49.580510 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.580558 kubelet[2728]: E0209 12:45:49.580544 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.581228 kubelet[2728]: E0209 12:45:49.581132 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.581228 kubelet[2728]: W0209 12:45:49.581167 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.581228 kubelet[2728]: E0209 12:45:49.581205 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.581830 kubelet[2728]: E0209 12:45:49.581733 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.581830 kubelet[2728]: W0209 12:45:49.581767 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.581830 kubelet[2728]: E0209 12:45:49.581806 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.582305 kubelet[2728]: E0209 12:45:49.582275 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.582305 kubelet[2728]: W0209 12:45:49.582302 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.582584 kubelet[2728]: E0209 12:45:49.582336 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.582939 kubelet[2728]: E0209 12:45:49.582864 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.582939 kubelet[2728]: W0209 12:45:49.582899 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.582939 kubelet[2728]: E0209 12:45:49.582938 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.583508 kubelet[2728]: E0209 12:45:49.583435 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.583508 kubelet[2728]: W0209 12:45:49.583460 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.583508 kubelet[2728]: E0209 12:45:49.583492 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.583956 kubelet[2728]: E0209 12:45:49.583932 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.583956 kubelet[2728]: W0209 12:45:49.583955 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.584185 kubelet[2728]: E0209 12:45:49.583989 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.603862 kubelet[2728]: E0209 12:45:49.603754 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.603862 kubelet[2728]: W0209 12:45:49.603797 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.603862 kubelet[2728]: E0209 12:45:49.603846 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.604473 kubelet[2728]: E0209 12:45:49.604426 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.604473 kubelet[2728]: W0209 12:45:49.604455 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.604737 kubelet[2728]: E0209 12:45:49.604499 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.605102 kubelet[2728]: E0209 12:45:49.605057 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.605102 kubelet[2728]: W0209 12:45:49.605091 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.605480 kubelet[2728]: E0209 12:45:49.605142 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.605759 kubelet[2728]: E0209 12:45:49.605686 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.605759 kubelet[2728]: W0209 12:45:49.605719 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.605759 kubelet[2728]: E0209 12:45:49.605765 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.606311 kubelet[2728]: E0209 12:45:49.606277 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.606511 kubelet[2728]: W0209 12:45:49.606317 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.606511 kubelet[2728]: E0209 12:45:49.606440 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.606957 kubelet[2728]: E0209 12:45:49.606865 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.606957 kubelet[2728]: W0209 12:45:49.606899 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.607381 kubelet[2728]: E0209 12:45:49.607010 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.607381 kubelet[2728]: E0209 12:45:49.607379 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.607710 kubelet[2728]: W0209 12:45:49.607420 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.607710 kubelet[2728]: E0209 12:45:49.607510 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.607976 kubelet[2728]: E0209 12:45:49.607937 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.607976 kubelet[2728]: W0209 12:45:49.607972 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.608351 kubelet[2728]: E0209 12:45:49.608020 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.608678 kubelet[2728]: E0209 12:45:49.608638 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.608678 kubelet[2728]: W0209 12:45:49.608672 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.609042 kubelet[2728]: E0209 12:45:49.608736 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.609286 kubelet[2728]: E0209 12:45:49.609252 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.609506 kubelet[2728]: W0209 12:45:49.609284 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.609506 kubelet[2728]: E0209 12:45:49.609410 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.610019 kubelet[2728]: E0209 12:45:49.609978 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.610019 kubelet[2728]: W0209 12:45:49.610013 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.610354 kubelet[2728]: E0209 12:45:49.610146 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.610571 kubelet[2728]: E0209 12:45:49.610530 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.610571 kubelet[2728]: W0209 12:45:49.610561 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.610913 kubelet[2728]: E0209 12:45:49.610715 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.611122 kubelet[2728]: E0209 12:45:49.611082 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.611122 kubelet[2728]: W0209 12:45:49.611119 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.611472 kubelet[2728]: E0209 12:45:49.611270 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.611672 kubelet[2728]: E0209 12:45:49.611631 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.611672 kubelet[2728]: W0209 12:45:49.611664 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.612040 kubelet[2728]: E0209 12:45:49.611725 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.612347 kubelet[2728]: E0209 12:45:49.612312 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.612347 kubelet[2728]: W0209 12:45:49.612345 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.612730 kubelet[2728]: E0209 12:45:49.612421 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.613036 kubelet[2728]: E0209 12:45:49.612991 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.613036 kubelet[2728]: W0209 12:45:49.613027 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.613446 kubelet[2728]: E0209 12:45:49.613073 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.614013 kubelet[2728]: E0209 12:45:49.613925 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.614013 kubelet[2728]: W0209 12:45:49.613959 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.614013 kubelet[2728]: E0209 12:45:49.614012 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:49.614621 kubelet[2728]: E0209 12:45:49.614577 2728 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:45:49.614798 kubelet[2728]: W0209 12:45:49.614623 2728 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:45:49.614798 kubelet[2728]: E0209 12:45:49.614682 2728 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:45:50.459598 kubelet[2728]: E0209 12:45:50.459523 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:45:52.459621 kubelet[2728]: E0209 12:45:52.459593 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:45:54.459814 kubelet[2728]: E0209 12:45:54.459703 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:45:56.459930 kubelet[2728]: E0209 12:45:56.459827 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:45:58.460341 kubelet[2728]: E0209 12:45:58.460215 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:00.460018 kubelet[2728]: E0209 12:46:00.459905 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:00.626060 env[1555]: time="2024-02-09T12:46:00.626035982Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:46:00.626680 env[1555]: time="2024-02-09T12:46:00.626658454Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:46:00.628112 env[1555]: time="2024-02-09T12:46:00.628098359Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:46:00.629946 env[1555]: time="2024-02-09T12:46:00.629899301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:46:00.630907 env[1555]: time="2024-02-09T12:46:00.630864812Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 12:46:00.631734 env[1555]: time="2024-02-09T12:46:00.631699053Z" level=info msg="CreateContainer within sandbox \"657e0b922938a09bf0b213e3b76995abaf0714d21e6b135a72ac36c9b1e9b8f1\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 12:46:00.636458 env[1555]: time="2024-02-09T12:46:00.636366794Z" level=info msg="CreateContainer within sandbox \"657e0b922938a09bf0b213e3b76995abaf0714d21e6b135a72ac36c9b1e9b8f1\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3d6e20c6f12db88ab651a699cca7b71c935856586bcf30b8fd7f61439f130294\"" Feb 9 12:46:00.636756 env[1555]: time="2024-02-09T12:46:00.636707313Z" level=info msg="StartContainer for \"3d6e20c6f12db88ab651a699cca7b71c935856586bcf30b8fd7f61439f130294\"" Feb 9 12:46:00.684917 env[1555]: time="2024-02-09T12:46:00.684892494Z" level=info msg="StartContainer for \"3d6e20c6f12db88ab651a699cca7b71c935856586bcf30b8fd7f61439f130294\" returns successfully" Feb 9 12:46:00.711142 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3d6e20c6f12db88ab651a699cca7b71c935856586bcf30b8fd7f61439f130294-rootfs.mount: Deactivated successfully. Feb 9 12:46:01.086342 env[1555]: time="2024-02-09T12:46:01.086074738Z" level=info msg="shim disconnected" id=3d6e20c6f12db88ab651a699cca7b71c935856586bcf30b8fd7f61439f130294 Feb 9 12:46:01.086342 env[1555]: time="2024-02-09T12:46:01.086198303Z" level=warning msg="cleaning up after shim disconnected" id=3d6e20c6f12db88ab651a699cca7b71c935856586bcf30b8fd7f61439f130294 namespace=k8s.io Feb 9 12:46:01.086342 env[1555]: time="2024-02-09T12:46:01.086232496Z" level=info msg="cleaning up dead shim" Feb 9 12:46:01.106648 env[1555]: time="2024-02-09T12:46:01.106587030Z" level=warning msg="cleanup warnings time=\"2024-02-09T12:46:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3678 runtime=io.containerd.runc.v2\n" Feb 9 12:46:01.583081 env[1555]: time="2024-02-09T12:46:01.582987926Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 12:46:02.459535 kubelet[2728]: E0209 12:46:02.459435 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:04.459959 kubelet[2728]: E0209 12:46:04.459897 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:05.010955 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1569008941.mount: Deactivated successfully. Feb 9 12:46:06.459994 kubelet[2728]: E0209 12:46:06.459888 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:08.460145 kubelet[2728]: E0209 12:46:08.460087 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:10.460273 kubelet[2728]: E0209 12:46:10.460174 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:12.459750 kubelet[2728]: E0209 12:46:12.459700 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:14.460556 kubelet[2728]: E0209 12:46:14.460495 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:14.764336 systemd[1]: Started sshd@7-139.178.91.169:22-141.98.11.90:23504.service. Feb 9 12:46:14.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.91.169:22-141.98.11.90:23504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:46:14.855416 kernel: audit: type=1130 audit(1707482774.763:283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.91.169:22-141.98.11.90:23504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:46:16.037312 sshd[3703]: Invalid user 12345 from 141.98.11.90 port 23504 Feb 9 12:46:16.287692 sshd[3703]: pam_faillock(sshd:auth): User unknown Feb 9 12:46:16.287000 audit[3703]: USER_AUTH pid=3703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="12345" exe="/usr/sbin/sshd" hostname=141.98.11.90 addr=141.98.11.90 terminal=ssh res=failed' Feb 9 12:46:16.287983 sshd[3703]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:46:16.288062 sshd[3703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.90 Feb 9 12:46:16.288258 sshd[3703]: pam_faillock(sshd:auth): User unknown Feb 9 12:46:16.385468 kernel: audit: type=1100 audit(1707482776.287:284): pid=3703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="12345" exe="/usr/sbin/sshd" hostname=141.98.11.90 addr=141.98.11.90 terminal=ssh res=failed' Feb 9 12:46:16.459277 kubelet[2728]: E0209 12:46:16.459222 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:18.435133 sshd[3703]: Failed password for invalid user 12345 from 141.98.11.90 port 23504 ssh2 Feb 9 12:46:18.459385 kubelet[2728]: E0209 12:46:18.459365 2728 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:19.234978 env[1555]: time="2024-02-09T12:46:19.234921659Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:46:19.235630 env[1555]: time="2024-02-09T12:46:19.235590824Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:46:19.236435 env[1555]: time="2024-02-09T12:46:19.236384973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:46:19.237360 env[1555]: time="2024-02-09T12:46:19.237319799Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:46:19.238226 env[1555]: time="2024-02-09T12:46:19.238186521Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 12:46:19.249349 env[1555]: time="2024-02-09T12:46:19.249307856Z" level=info msg="CreateContainer within sandbox \"657e0b922938a09bf0b213e3b76995abaf0714d21e6b135a72ac36c9b1e9b8f1\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 12:46:19.254578 env[1555]: time="2024-02-09T12:46:19.254526216Z" level=info msg="CreateContainer within sandbox \"657e0b922938a09bf0b213e3b76995abaf0714d21e6b135a72ac36c9b1e9b8f1\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7f20a531f9c72a2d5206b50ff5d5918caa77a3e4906e3e11a9085a85baaf2f8e\"" Feb 9 12:46:19.254769 env[1555]: time="2024-02-09T12:46:19.254755946Z" level=info msg="StartContainer for \"7f20a531f9c72a2d5206b50ff5d5918caa77a3e4906e3e11a9085a85baaf2f8e\"" Feb 9 12:46:19.309146 env[1555]: time="2024-02-09T12:46:19.309094901Z" level=info msg="StartContainer for \"7f20a531f9c72a2d5206b50ff5d5918caa77a3e4906e3e11a9085a85baaf2f8e\" returns successfully" Feb 9 12:46:20.064385 kubelet[2728]: I0209 12:46:20.064362 2728 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 12:46:20.081604 kubelet[2728]: I0209 12:46:20.081539 2728 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:46:20.082494 kubelet[2728]: I0209 12:46:20.082468 2728 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:46:20.083101 kubelet[2728]: I0209 12:46:20.083080 2728 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:46:20.103062 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7f20a531f9c72a2d5206b50ff5d5918caa77a3e4906e3e11a9085a85baaf2f8e-rootfs.mount: Deactivated successfully. Feb 9 12:46:20.188669 kubelet[2728]: I0209 12:46:20.188566 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-krwmg\" (UniqueName: \"kubernetes.io/projected/ca9ba966-733c-4c50-9cea-076af2df5ddd-kube-api-access-krwmg\") pod \"coredns-787d4945fb-l6lth\" (UID: \"ca9ba966-733c-4c50-9cea-076af2df5ddd\") " pod="kube-system/coredns-787d4945fb-l6lth" Feb 9 12:46:20.189036 kubelet[2728]: I0209 12:46:20.188790 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ca9ba966-733c-4c50-9cea-076af2df5ddd-config-volume\") pod \"coredns-787d4945fb-l6lth\" (UID: \"ca9ba966-733c-4c50-9cea-076af2df5ddd\") " pod="kube-system/coredns-787d4945fb-l6lth" Feb 9 12:46:20.189036 kubelet[2728]: I0209 12:46:20.188979 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2x9d8\" (UniqueName: \"kubernetes.io/projected/a361b76f-ced1-4e9c-8f8c-27ce35bfca6f-kube-api-access-2x9d8\") pod \"calico-kube-controllers-7cb69b6b86-5vkkn\" (UID: \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\") " pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" Feb 9 12:46:20.189279 kubelet[2728]: I0209 12:46:20.189095 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-58qzv\" (UniqueName: \"kubernetes.io/projected/c1cd8082-cdbc-42e8-af70-b207780880fb-kube-api-access-58qzv\") pod \"coredns-787d4945fb-r6ph9\" (UID: \"c1cd8082-cdbc-42e8-af70-b207780880fb\") " pod="kube-system/coredns-787d4945fb-r6ph9" Feb 9 12:46:20.189279 kubelet[2728]: I0209 12:46:20.189184 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a361b76f-ced1-4e9c-8f8c-27ce35bfca6f-tigera-ca-bundle\") pod \"calico-kube-controllers-7cb69b6b86-5vkkn\" (UID: \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\") " pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" Feb 9 12:46:20.189588 kubelet[2728]: I0209 12:46:20.189309 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c1cd8082-cdbc-42e8-af70-b207780880fb-config-volume\") pod \"coredns-787d4945fb-r6ph9\" (UID: \"c1cd8082-cdbc-42e8-af70-b207780880fb\") " pod="kube-system/coredns-787d4945fb-r6ph9" Feb 9 12:46:20.386911 env[1555]: time="2024-02-09T12:46:20.386721657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7cb69b6b86-5vkkn,Uid:a361b76f-ced1-4e9c-8f8c-27ce35bfca6f,Namespace:calico-system,Attempt:0,}" Feb 9 12:46:20.387581 env[1555]: time="2024-02-09T12:46:20.387021360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-r6ph9,Uid:c1cd8082-cdbc-42e8-af70-b207780880fb,Namespace:kube-system,Attempt:0,}" Feb 9 12:46:20.388842 env[1555]: time="2024-02-09T12:46:20.388761592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-l6lth,Uid:ca9ba966-733c-4c50-9cea-076af2df5ddd,Namespace:kube-system,Attempt:0,}" Feb 9 12:46:20.465519 env[1555]: time="2024-02-09T12:46:20.465386938Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2lnwr,Uid:3d7559de-a11a-443c-bbd2-21f3384d343f,Namespace:calico-system,Attempt:0,}" Feb 9 12:46:20.493247 sshd[3703]: Connection closed by invalid user 12345 141.98.11.90 port 23504 [preauth] Feb 9 12:46:20.495778 systemd[1]: sshd@7-139.178.91.169:22-141.98.11.90:23504.service: Deactivated successfully. Feb 9 12:46:20.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.91.169:22-141.98.11.90:23504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:46:20.588442 kernel: audit: type=1131 audit(1707482780.495:285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.91.169:22-141.98.11.90:23504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:46:20.609076 env[1555]: time="2024-02-09T12:46:20.609033466Z" level=info msg="shim disconnected" id=7f20a531f9c72a2d5206b50ff5d5918caa77a3e4906e3e11a9085a85baaf2f8e Feb 9 12:46:20.609213 env[1555]: time="2024-02-09T12:46:20.609096095Z" level=warning msg="cleaning up after shim disconnected" id=7f20a531f9c72a2d5206b50ff5d5918caa77a3e4906e3e11a9085a85baaf2f8e namespace=k8s.io Feb 9 12:46:20.609213 env[1555]: time="2024-02-09T12:46:20.609105290Z" level=info msg="cleaning up dead shim" Feb 9 12:46:20.613316 env[1555]: time="2024-02-09T12:46:20.613296963Z" level=warning msg="cleanup warnings time=\"2024-02-09T12:46:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3780 runtime=io.containerd.runc.v2\n" Feb 9 12:46:20.641186 env[1555]: time="2024-02-09T12:46:20.641122696Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 12:46:20.641186 env[1555]: time="2024-02-09T12:46:20.641158165Z" level=error msg="Failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.641318 env[1555]: time="2024-02-09T12:46:20.641252713Z" level=error msg="Failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.641488 env[1555]: time="2024-02-09T12:46:20.641441311Z" level=error msg="Failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.641538 env[1555]: time="2024-02-09T12:46:20.641512241Z" level=error msg="encountered an error cleaning up failed sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.641538 env[1555]: time="2024-02-09T12:46:20.641522544Z" level=error msg="encountered an error cleaning up failed sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.641607 env[1555]: time="2024-02-09T12:46:20.641541031Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-l6lth,Uid:ca9ba966-733c-4c50-9cea-076af2df5ddd,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.641607 env[1555]: time="2024-02-09T12:46:20.641549434Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-r6ph9,Uid:c1cd8082-cdbc-42e8-af70-b207780880fb,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.641683 kubelet[2728]: E0209 12:46:20.641637 2728 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.641683 kubelet[2728]: E0209 12:46:20.641638 2728 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.641683 kubelet[2728]: E0209 12:46:20.641667 2728 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-l6lth" Feb 9 12:46:20.641683 kubelet[2728]: E0209 12:46:20.641668 2728 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-r6ph9" Feb 9 12:46:20.641814 kubelet[2728]: E0209 12:46:20.641683 2728 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-l6lth" Feb 9 12:46:20.641814 kubelet[2728]: E0209 12:46:20.641684 2728 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-r6ph9" Feb 9 12:46:20.641814 kubelet[2728]: E0209 12:46:20.641710 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-l6lth_kube-system(ca9ba966-733c-4c50-9cea-076af2df5ddd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-l6lth_kube-system(ca9ba966-733c-4c50-9cea-076af2df5ddd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:46:20.641909 env[1555]: time="2024-02-09T12:46:20.641679618Z" level=error msg="encountered an error cleaning up failed sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.641909 env[1555]: time="2024-02-09T12:46:20.641709764Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7cb69b6b86-5vkkn,Uid:a361b76f-ced1-4e9c-8f8c-27ce35bfca6f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.641972 kubelet[2728]: E0209 12:46:20.641710 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-r6ph9_kube-system(c1cd8082-cdbc-42e8-af70-b207780880fb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-r6ph9_kube-system(c1cd8082-cdbc-42e8-af70-b207780880fb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:46:20.641972 kubelet[2728]: E0209 12:46:20.641785 2728 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.641972 kubelet[2728]: E0209 12:46:20.641798 2728 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" Feb 9 12:46:20.642063 kubelet[2728]: E0209 12:46:20.641810 2728 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" Feb 9 12:46:20.642063 kubelet[2728]: E0209 12:46:20.641829 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7cb69b6b86-5vkkn_calico-system(a361b76f-ced1-4e9c-8f8c-27ce35bfca6f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7cb69b6b86-5vkkn_calico-system(a361b76f-ced1-4e9c-8f8c-27ce35bfca6f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:46:20.642763 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1-shm.mount: Deactivated successfully. Feb 9 12:46:20.642881 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f-shm.mount: Deactivated successfully. Feb 9 12:46:20.642963 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a-shm.mount: Deactivated successfully. Feb 9 12:46:20.652069 env[1555]: time="2024-02-09T12:46:20.652035880Z" level=error msg="Failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.652258 env[1555]: time="2024-02-09T12:46:20.652241545Z" level=error msg="encountered an error cleaning up failed sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.652307 env[1555]: time="2024-02-09T12:46:20.652271876Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2lnwr,Uid:3d7559de-a11a-443c-bbd2-21f3384d343f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.652433 kubelet[2728]: E0209 12:46:20.652422 2728 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:20.652489 kubelet[2728]: E0209 12:46:20.652455 2728 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2lnwr" Feb 9 12:46:20.652489 kubelet[2728]: E0209 12:46:20.652476 2728 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2lnwr" Feb 9 12:46:20.652552 kubelet[2728]: E0209 12:46:20.652516 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2lnwr_calico-system(3d7559de-a11a-443c-bbd2-21f3384d343f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2lnwr_calico-system(3d7559de-a11a-443c-bbd2-21f3384d343f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:21.309675 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332-shm.mount: Deactivated successfully. Feb 9 12:46:21.645099 kubelet[2728]: I0209 12:46:21.644922 2728 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:46:21.646354 env[1555]: time="2024-02-09T12:46:21.646274814Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:46:21.647350 kubelet[2728]: I0209 12:46:21.647296 2728 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:46:21.648622 env[1555]: time="2024-02-09T12:46:21.648542356Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:46:21.649520 kubelet[2728]: I0209 12:46:21.649458 2728 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:46:21.650851 env[1555]: time="2024-02-09T12:46:21.650712681Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:46:21.651703 kubelet[2728]: I0209 12:46:21.651659 2728 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:46:21.652922 env[1555]: time="2024-02-09T12:46:21.652831876Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:46:21.695332 env[1555]: time="2024-02-09T12:46:21.695277720Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:21.695542 kubelet[2728]: E0209 12:46:21.695522 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:46:21.695640 kubelet[2728]: E0209 12:46:21.695584 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:46:21.695708 kubelet[2728]: E0209 12:46:21.695646 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:21.695708 kubelet[2728]: E0209 12:46:21.695697 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:21.696774 env[1555]: time="2024-02-09T12:46:21.696729671Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:21.696921 kubelet[2728]: E0209 12:46:21.696881 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:46:21.696921 kubelet[2728]: E0209 12:46:21.696906 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:46:21.697036 kubelet[2728]: E0209 12:46:21.696939 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:21.697036 kubelet[2728]: E0209 12:46:21.696969 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:46:21.698562 env[1555]: time="2024-02-09T12:46:21.698498200Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:21.698664 kubelet[2728]: E0209 12:46:21.698650 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:46:21.698747 kubelet[2728]: E0209 12:46:21.698682 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:46:21.698747 kubelet[2728]: E0209 12:46:21.698737 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:21.698889 kubelet[2728]: E0209 12:46:21.698782 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:46:21.700352 env[1555]: time="2024-02-09T12:46:21.700296523Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:21.700487 kubelet[2728]: E0209 12:46:21.700441 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:46:21.700487 kubelet[2728]: E0209 12:46:21.700469 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:46:21.700592 kubelet[2728]: E0209 12:46:21.700497 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:21.700592 kubelet[2728]: E0209 12:46:21.700521 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:46:32.460433 env[1555]: time="2024-02-09T12:46:32.460384252Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:46:32.476349 env[1555]: time="2024-02-09T12:46:32.476289376Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:32.476504 kubelet[2728]: E0209 12:46:32.476465 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:46:32.476504 kubelet[2728]: E0209 12:46:32.476488 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:46:32.476704 kubelet[2728]: E0209 12:46:32.476509 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:32.476704 kubelet[2728]: E0209 12:46:32.476527 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:46:33.460336 env[1555]: time="2024-02-09T12:46:33.460304269Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:46:33.480229 env[1555]: time="2024-02-09T12:46:33.480179907Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:33.480588 kubelet[2728]: E0209 12:46:33.480386 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:46:33.480588 kubelet[2728]: E0209 12:46:33.480436 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:46:33.480588 kubelet[2728]: E0209 12:46:33.480474 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:33.480588 kubelet[2728]: E0209 12:46:33.480504 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:46:35.461545 env[1555]: time="2024-02-09T12:46:35.461382545Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:46:35.461545 env[1555]: time="2024-02-09T12:46:35.461496517Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:46:35.514277 env[1555]: time="2024-02-09T12:46:35.514189998Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:35.514499 kubelet[2728]: E0209 12:46:35.514446 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:46:35.514499 kubelet[2728]: E0209 12:46:35.514491 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:46:35.514923 kubelet[2728]: E0209 12:46:35.514536 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:35.514923 kubelet[2728]: E0209 12:46:35.514573 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:46:35.514923 kubelet[2728]: E0209 12:46:35.514878 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:46:35.514923 kubelet[2728]: E0209 12:46:35.514911 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:46:35.515186 env[1555]: time="2024-02-09T12:46:35.514703617Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:35.515247 kubelet[2728]: E0209 12:46:35.514951 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:35.515247 kubelet[2728]: E0209 12:46:35.514986 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:44.461483 env[1555]: time="2024-02-09T12:46:44.461364378Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:46:44.487724 env[1555]: time="2024-02-09T12:46:44.487690235Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:44.487867 kubelet[2728]: E0209 12:46:44.487825 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:46:44.487867 kubelet[2728]: E0209 12:46:44.487852 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:46:44.488060 kubelet[2728]: E0209 12:46:44.487873 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:44.488060 kubelet[2728]: E0209 12:46:44.487889 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:46:47.461455 env[1555]: time="2024-02-09T12:46:47.461327952Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:46:47.487931 env[1555]: time="2024-02-09T12:46:47.487851313Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:47.488091 kubelet[2728]: E0209 12:46:47.488081 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:46:47.488256 kubelet[2728]: E0209 12:46:47.488107 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:46:47.488256 kubelet[2728]: E0209 12:46:47.488127 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:47.488256 kubelet[2728]: E0209 12:46:47.488144 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:48.460905 env[1555]: time="2024-02-09T12:46:48.460810150Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:46:48.487522 env[1555]: time="2024-02-09T12:46:48.487463963Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:48.487768 kubelet[2728]: E0209 12:46:48.487635 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:46:48.487768 kubelet[2728]: E0209 12:46:48.487695 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:46:48.487768 kubelet[2728]: E0209 12:46:48.487716 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:48.487768 kubelet[2728]: E0209 12:46:48.487737 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:46:49.461154 env[1555]: time="2024-02-09T12:46:49.461037106Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:46:49.489109 env[1555]: time="2024-02-09T12:46:49.489054988Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:49.489403 kubelet[2728]: E0209 12:46:49.489247 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:46:49.489403 kubelet[2728]: E0209 12:46:49.489277 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:46:49.489403 kubelet[2728]: E0209 12:46:49.489308 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:49.489403 kubelet[2728]: E0209 12:46:49.489334 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:46:59.460828 env[1555]: time="2024-02-09T12:46:59.460719512Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:46:59.460828 env[1555]: time="2024-02-09T12:46:59.460762806Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:46:59.462128 env[1555]: time="2024-02-09T12:46:59.460992740Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:46:59.508833 env[1555]: time="2024-02-09T12:46:59.508746674Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:59.508833 env[1555]: time="2024-02-09T12:46:59.508753925Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:59.509109 env[1555]: time="2024-02-09T12:46:59.508967512Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:46:59.509187 kubelet[2728]: E0209 12:46:59.508988 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:46:59.509187 kubelet[2728]: E0209 12:46:59.509035 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:46:59.509187 kubelet[2728]: E0209 12:46:59.508989 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:46:59.509187 kubelet[2728]: E0209 12:46:59.509092 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:59.509187 kubelet[2728]: E0209 12:46:59.509108 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:46:59.509700 kubelet[2728]: E0209 12:46:59.509118 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:46:59.509700 kubelet[2728]: E0209 12:46:59.509123 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:46:59.509700 kubelet[2728]: E0209 12:46:59.509143 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:46:59.509700 kubelet[2728]: E0209 12:46:59.509163 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:59.509901 kubelet[2728]: E0209 12:46:59.509176 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:46:59.509901 kubelet[2728]: E0209 12:46:59.509206 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:46:59.509901 kubelet[2728]: E0209 12:46:59.509218 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:47:02.460043 env[1555]: time="2024-02-09T12:47:02.459985722Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:47:02.475774 env[1555]: time="2024-02-09T12:47:02.475713449Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:02.475866 kubelet[2728]: E0209 12:47:02.475856 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:47:02.476028 kubelet[2728]: E0209 12:47:02.475880 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:47:02.476028 kubelet[2728]: E0209 12:47:02.475903 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:02.476028 kubelet[2728]: E0209 12:47:02.475920 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:47:10.461319 env[1555]: time="2024-02-09T12:47:10.461236036Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:47:10.462420 env[1555]: time="2024-02-09T12:47:10.461373031Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:47:10.488348 env[1555]: time="2024-02-09T12:47:10.488314719Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:10.488348 env[1555]: time="2024-02-09T12:47:10.488331431Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:10.488564 kubelet[2728]: E0209 12:47:10.488510 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:47:10.488754 kubelet[2728]: E0209 12:47:10.488566 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:47:10.488754 kubelet[2728]: E0209 12:47:10.488587 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:10.488754 kubelet[2728]: E0209 12:47:10.488509 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:47:10.488754 kubelet[2728]: E0209 12:47:10.488605 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:47:10.488754 kubelet[2728]: E0209 12:47:10.488606 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:47:10.488889 kubelet[2728]: E0209 12:47:10.488624 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:10.488889 kubelet[2728]: E0209 12:47:10.488654 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:47:11.460430 env[1555]: time="2024-02-09T12:47:11.460356644Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:47:11.482841 env[1555]: time="2024-02-09T12:47:11.482745020Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:11.483124 kubelet[2728]: E0209 12:47:11.482987 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:47:11.483124 kubelet[2728]: E0209 12:47:11.483010 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:47:11.483124 kubelet[2728]: E0209 12:47:11.483030 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:11.483124 kubelet[2728]: E0209 12:47:11.483048 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:47:15.461350 env[1555]: time="2024-02-09T12:47:15.461206194Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:47:15.513276 env[1555]: time="2024-02-09T12:47:15.513206595Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:15.513507 kubelet[2728]: E0209 12:47:15.513481 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:47:15.513918 kubelet[2728]: E0209 12:47:15.513532 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:47:15.513918 kubelet[2728]: E0209 12:47:15.513587 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:15.513918 kubelet[2728]: E0209 12:47:15.513628 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:47:23.461689 env[1555]: time="2024-02-09T12:47:23.461547628Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:47:23.488209 env[1555]: time="2024-02-09T12:47:23.488127252Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:23.488307 kubelet[2728]: E0209 12:47:23.488296 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:47:23.488492 kubelet[2728]: E0209 12:47:23.488322 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:47:23.488492 kubelet[2728]: E0209 12:47:23.488344 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:23.488492 kubelet[2728]: E0209 12:47:23.488360 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:47:24.461456 env[1555]: time="2024-02-09T12:47:24.461323590Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:47:24.487472 env[1555]: time="2024-02-09T12:47:24.487370514Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:24.487687 kubelet[2728]: E0209 12:47:24.487552 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:47:24.487687 kubelet[2728]: E0209 12:47:24.487576 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:47:24.487687 kubelet[2728]: E0209 12:47:24.487598 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:24.487687 kubelet[2728]: E0209 12:47:24.487616 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:47:25.461546 env[1555]: time="2024-02-09T12:47:25.461415580Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:47:25.488897 env[1555]: time="2024-02-09T12:47:25.488833853Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:25.489109 kubelet[2728]: E0209 12:47:25.489004 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:47:25.489109 kubelet[2728]: E0209 12:47:25.489028 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:47:25.489109 kubelet[2728]: E0209 12:47:25.489050 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:25.489109 kubelet[2728]: E0209 12:47:25.489067 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:47:26.460842 env[1555]: time="2024-02-09T12:47:26.460750673Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:47:26.487071 env[1555]: time="2024-02-09T12:47:26.487011176Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:26.487188 kubelet[2728]: E0209 12:47:26.487172 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:47:26.487225 kubelet[2728]: E0209 12:47:26.487198 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:47:26.487225 kubelet[2728]: E0209 12:47:26.487220 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:26.487284 kubelet[2728]: E0209 12:47:26.487237 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:47:34.461219 env[1555]: time="2024-02-09T12:47:34.461035006Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:47:34.514719 env[1555]: time="2024-02-09T12:47:34.514627245Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:34.514879 kubelet[2728]: E0209 12:47:34.514850 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:47:34.515208 kubelet[2728]: E0209 12:47:34.514895 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:47:34.515208 kubelet[2728]: E0209 12:47:34.514949 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:34.515208 kubelet[2728]: E0209 12:47:34.514986 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:47:37.460812 env[1555]: time="2024-02-09T12:47:37.460718860Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:47:37.514371 env[1555]: time="2024-02-09T12:47:37.514312101Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:37.514638 kubelet[2728]: E0209 12:47:37.514589 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:47:37.514638 kubelet[2728]: E0209 12:47:37.514631 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:47:37.515025 kubelet[2728]: E0209 12:47:37.514674 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:37.515025 kubelet[2728]: E0209 12:47:37.514708 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:47:38.460298 env[1555]: time="2024-02-09T12:47:38.460262051Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:47:38.481204 env[1555]: time="2024-02-09T12:47:38.481155830Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:38.481687 kubelet[2728]: E0209 12:47:38.481352 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:47:38.481687 kubelet[2728]: E0209 12:47:38.481405 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:47:38.481687 kubelet[2728]: E0209 12:47:38.481447 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:38.481687 kubelet[2728]: E0209 12:47:38.481507 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:47:39.461559 env[1555]: time="2024-02-09T12:47:39.461418411Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:47:39.516314 env[1555]: time="2024-02-09T12:47:39.516231398Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:39.516726 kubelet[2728]: E0209 12:47:39.516465 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:47:39.516726 kubelet[2728]: E0209 12:47:39.516506 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:47:39.516726 kubelet[2728]: E0209 12:47:39.516550 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:39.516726 kubelet[2728]: E0209 12:47:39.516583 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:47:48.461425 env[1555]: time="2024-02-09T12:47:48.461277655Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:47:48.517006 env[1555]: time="2024-02-09T12:47:48.516927399Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:48.517190 kubelet[2728]: E0209 12:47:48.517148 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:47:48.517632 kubelet[2728]: E0209 12:47:48.517195 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:47:48.517632 kubelet[2728]: E0209 12:47:48.517258 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:48.517632 kubelet[2728]: E0209 12:47:48.517305 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:47:49.461171 env[1555]: time="2024-02-09T12:47:49.461059316Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:47:49.517090 env[1555]: time="2024-02-09T12:47:49.517014935Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:49.517602 kubelet[2728]: E0209 12:47:49.517285 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:47:49.517602 kubelet[2728]: E0209 12:47:49.517334 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:47:49.517602 kubelet[2728]: E0209 12:47:49.517407 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:49.517602 kubelet[2728]: E0209 12:47:49.517461 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:47:51.460565 env[1555]: time="2024-02-09T12:47:51.460458323Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:47:51.514026 env[1555]: time="2024-02-09T12:47:51.513924417Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:51.514290 kubelet[2728]: E0209 12:47:51.514233 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:47:51.514290 kubelet[2728]: E0209 12:47:51.514284 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:47:51.514756 kubelet[2728]: E0209 12:47:51.514338 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:51.514756 kubelet[2728]: E0209 12:47:51.514379 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:47:53.459944 env[1555]: time="2024-02-09T12:47:53.459905163Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:47:53.473632 env[1555]: time="2024-02-09T12:47:53.473561704Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:47:53.473759 kubelet[2728]: E0209 12:47:53.473732 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:47:53.473999 kubelet[2728]: E0209 12:47:53.473768 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:47:53.473999 kubelet[2728]: E0209 12:47:53.473809 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:47:53.473999 kubelet[2728]: E0209 12:47:53.473848 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:48:02.460009 env[1555]: time="2024-02-09T12:48:02.459978092Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:48:02.460405 env[1555]: time="2024-02-09T12:48:02.459978238Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:48:02.460405 env[1555]: time="2024-02-09T12:48:02.460095583Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:48:02.475772 env[1555]: time="2024-02-09T12:48:02.475735618Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:02.475881 env[1555]: time="2024-02-09T12:48:02.475795987Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:02.475881 env[1555]: time="2024-02-09T12:48:02.475827284Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:02.475955 kubelet[2728]: E0209 12:48:02.475890 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:48:02.475955 kubelet[2728]: E0209 12:48:02.475902 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:48:02.475955 kubelet[2728]: E0209 12:48:02.475917 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:48:02.475955 kubelet[2728]: E0209 12:48:02.475917 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:48:02.475955 kubelet[2728]: E0209 12:48:02.475939 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:02.476308 kubelet[2728]: E0209 12:48:02.475940 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:02.476308 kubelet[2728]: E0209 12:48:02.475957 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:48:02.476308 kubelet[2728]: E0209 12:48:02.475957 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:48:02.476429 kubelet[2728]: E0209 12:48:02.475973 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:48:02.476429 kubelet[2728]: E0209 12:48:02.475988 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:48:02.476429 kubelet[2728]: E0209 12:48:02.476010 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:02.476429 kubelet[2728]: E0209 12:48:02.476028 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:48:05.460908 env[1555]: time="2024-02-09T12:48:05.460783834Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:48:05.506566 env[1555]: time="2024-02-09T12:48:05.506511083Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:05.506781 kubelet[2728]: E0209 12:48:05.506731 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:48:05.506781 kubelet[2728]: E0209 12:48:05.506774 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:48:05.507115 kubelet[2728]: E0209 12:48:05.506814 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:05.507115 kubelet[2728]: E0209 12:48:05.506848 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:48:13.459540 env[1555]: time="2024-02-09T12:48:13.459487210Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:48:13.475566 env[1555]: time="2024-02-09T12:48:13.475497443Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:13.475716 kubelet[2728]: E0209 12:48:13.475671 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:48:13.475716 kubelet[2728]: E0209 12:48:13.475698 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:48:13.475944 kubelet[2728]: E0209 12:48:13.475724 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:13.475944 kubelet[2728]: E0209 12:48:13.475744 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:48:15.461555 env[1555]: time="2024-02-09T12:48:15.461420139Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:48:15.515861 env[1555]: time="2024-02-09T12:48:15.515775310Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:15.516078 kubelet[2728]: E0209 12:48:15.516026 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:48:15.516078 kubelet[2728]: E0209 12:48:15.516068 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:48:15.516479 kubelet[2728]: E0209 12:48:15.516111 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:15.516479 kubelet[2728]: E0209 12:48:15.516149 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:48:16.461120 env[1555]: time="2024-02-09T12:48:16.460973386Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:48:16.487515 env[1555]: time="2024-02-09T12:48:16.487458029Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:16.487732 kubelet[2728]: E0209 12:48:16.487622 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:48:16.487732 kubelet[2728]: E0209 12:48:16.487647 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:48:16.487732 kubelet[2728]: E0209 12:48:16.487668 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:16.487732 kubelet[2728]: E0209 12:48:16.487687 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:48:20.461354 env[1555]: time="2024-02-09T12:48:20.461254189Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:48:20.514755 env[1555]: time="2024-02-09T12:48:20.514670244Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:20.514912 kubelet[2728]: E0209 12:48:20.514881 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:48:20.515256 kubelet[2728]: E0209 12:48:20.514921 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:48:20.515256 kubelet[2728]: E0209 12:48:20.514962 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:20.515256 kubelet[2728]: E0209 12:48:20.514997 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:48:24.461254 env[1555]: time="2024-02-09T12:48:24.461166133Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:48:24.520696 env[1555]: time="2024-02-09T12:48:24.520545022Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:24.521094 kubelet[2728]: E0209 12:48:24.521008 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:48:24.521094 kubelet[2728]: E0209 12:48:24.521094 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:48:24.522109 kubelet[2728]: E0209 12:48:24.521196 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:24.522109 kubelet[2728]: E0209 12:48:24.521279 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:48:28.460448 env[1555]: time="2024-02-09T12:48:28.460341266Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:48:28.486863 env[1555]: time="2024-02-09T12:48:28.486831041Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:28.487039 kubelet[2728]: E0209 12:48:28.486997 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:48:28.487039 kubelet[2728]: E0209 12:48:28.487023 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:48:28.487232 kubelet[2728]: E0209 12:48:28.487046 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:28.487232 kubelet[2728]: E0209 12:48:28.487063 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:48:29.461376 env[1555]: time="2024-02-09T12:48:29.461232479Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:48:29.513961 env[1555]: time="2024-02-09T12:48:29.513871877Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:29.514166 kubelet[2728]: E0209 12:48:29.514120 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:48:29.514166 kubelet[2728]: E0209 12:48:29.514163 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:48:29.514562 kubelet[2728]: E0209 12:48:29.514206 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:29.514562 kubelet[2728]: E0209 12:48:29.514244 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:48:34.461241 env[1555]: time="2024-02-09T12:48:34.461218565Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:48:34.473683 env[1555]: time="2024-02-09T12:48:34.473649280Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:34.473867 kubelet[2728]: E0209 12:48:34.473826 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:48:34.473867 kubelet[2728]: E0209 12:48:34.473854 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:48:34.474073 kubelet[2728]: E0209 12:48:34.473877 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:34.474073 kubelet[2728]: E0209 12:48:34.473898 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:48:39.461148 env[1555]: time="2024-02-09T12:48:39.461058065Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:48:39.515070 env[1555]: time="2024-02-09T12:48:39.514995751Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:39.515328 kubelet[2728]: E0209 12:48:39.515304 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:48:39.515748 kubelet[2728]: E0209 12:48:39.515361 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:48:39.515748 kubelet[2728]: E0209 12:48:39.515432 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:39.515748 kubelet[2728]: E0209 12:48:39.515481 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:48:41.461543 env[1555]: time="2024-02-09T12:48:41.461451229Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:48:41.513328 env[1555]: time="2024-02-09T12:48:41.513226235Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:41.513601 kubelet[2728]: E0209 12:48:41.513546 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:48:41.513601 kubelet[2728]: E0209 12:48:41.513596 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:48:41.514067 kubelet[2728]: E0209 12:48:41.513653 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:41.514067 kubelet[2728]: E0209 12:48:41.513696 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:48:42.461438 env[1555]: time="2024-02-09T12:48:42.461311430Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:48:42.513264 env[1555]: time="2024-02-09T12:48:42.513178604Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:42.513677 kubelet[2728]: E0209 12:48:42.513448 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:48:42.513677 kubelet[2728]: E0209 12:48:42.513488 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:48:42.513677 kubelet[2728]: E0209 12:48:42.513535 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:42.513677 kubelet[2728]: E0209 12:48:42.513572 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:48:45.461243 env[1555]: time="2024-02-09T12:48:45.461142009Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:48:45.515877 env[1555]: time="2024-02-09T12:48:45.515803701Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:45.516125 kubelet[2728]: E0209 12:48:45.516102 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:48:45.516592 kubelet[2728]: E0209 12:48:45.516153 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:48:45.516592 kubelet[2728]: E0209 12:48:45.516206 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:45.516592 kubelet[2728]: E0209 12:48:45.516250 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:48:52.460117 env[1555]: time="2024-02-09T12:48:52.460087628Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:48:52.475158 env[1555]: time="2024-02-09T12:48:52.475099751Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:52.475248 kubelet[2728]: E0209 12:48:52.475235 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:48:52.475433 kubelet[2728]: E0209 12:48:52.475260 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:48:52.475433 kubelet[2728]: E0209 12:48:52.475284 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:52.475433 kubelet[2728]: E0209 12:48:52.475306 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:48:54.460411 env[1555]: time="2024-02-09T12:48:54.460306547Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:48:54.512466 env[1555]: time="2024-02-09T12:48:54.512365249Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:54.512665 kubelet[2728]: E0209 12:48:54.512633 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:48:54.513062 kubelet[2728]: E0209 12:48:54.512693 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:48:54.513062 kubelet[2728]: E0209 12:48:54.512763 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:54.513062 kubelet[2728]: E0209 12:48:54.512823 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:48:55.461258 env[1555]: time="2024-02-09T12:48:55.461143690Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:48:55.515178 env[1555]: time="2024-02-09T12:48:55.515090268Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:55.515464 kubelet[2728]: E0209 12:48:55.515408 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:48:55.515464 kubelet[2728]: E0209 12:48:55.515461 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:48:55.515965 kubelet[2728]: E0209 12:48:55.515515 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:55.515965 kubelet[2728]: E0209 12:48:55.515557 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:48:58.461364 env[1555]: time="2024-02-09T12:48:58.461274039Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:48:58.512857 env[1555]: time="2024-02-09T12:48:58.512772446Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:48:58.513035 kubelet[2728]: E0209 12:48:58.513010 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:48:58.513463 kubelet[2728]: E0209 12:48:58.513062 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:48:58.513463 kubelet[2728]: E0209 12:48:58.513130 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:48:58.513463 kubelet[2728]: E0209 12:48:58.513192 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:49:04.460654 env[1555]: time="2024-02-09T12:49:04.460453775Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:49:04.512583 env[1555]: time="2024-02-09T12:49:04.512523508Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:49:04.512825 kubelet[2728]: E0209 12:49:04.512775 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:49:04.512825 kubelet[2728]: E0209 12:49:04.512819 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:49:04.513215 kubelet[2728]: E0209 12:49:04.512863 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:49:04.513215 kubelet[2728]: E0209 12:49:04.512897 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:49:06.460751 env[1555]: time="2024-02-09T12:49:06.460651621Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:49:06.513263 env[1555]: time="2024-02-09T12:49:06.513195930Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:49:06.513529 kubelet[2728]: E0209 12:49:06.513476 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:49:06.513529 kubelet[2728]: E0209 12:49:06.513520 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:49:06.513937 kubelet[2728]: E0209 12:49:06.513564 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:49:06.513937 kubelet[2728]: E0209 12:49:06.513598 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:49:07.460902 env[1555]: time="2024-02-09T12:49:07.460806246Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:49:07.477870 env[1555]: time="2024-02-09T12:49:07.477811358Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:49:07.477963 kubelet[2728]: E0209 12:49:07.477945 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:49:07.477996 kubelet[2728]: E0209 12:49:07.477968 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:49:07.477996 kubelet[2728]: E0209 12:49:07.477990 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:49:07.478059 kubelet[2728]: E0209 12:49:07.478009 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:49:12.459991 env[1555]: time="2024-02-09T12:49:12.459953061Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:49:12.475699 env[1555]: time="2024-02-09T12:49:12.475633835Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:49:12.475801 kubelet[2728]: E0209 12:49:12.475792 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:49:12.475970 kubelet[2728]: E0209 12:49:12.475818 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:49:12.475970 kubelet[2728]: E0209 12:49:12.475840 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:49:12.475970 kubelet[2728]: E0209 12:49:12.475858 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:49:19.461423 env[1555]: time="2024-02-09T12:49:19.461286007Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:49:19.462604 env[1555]: time="2024-02-09T12:49:19.461358645Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:49:19.488667 env[1555]: time="2024-02-09T12:49:19.488605972Z" level=error msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" failed" error="failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:49:19.488667 env[1555]: time="2024-02-09T12:49:19.488639942Z" level=error msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" failed" error="failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:49:19.488791 kubelet[2728]: E0209 12:49:19.488744 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:49:19.488791 kubelet[2728]: E0209 12:49:19.488749 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:49:19.488791 kubelet[2728]: E0209 12:49:19.488769 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f} Feb 9 12:49:19.488791 kubelet[2728]: E0209 12:49:19.488769 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a} Feb 9 12:49:19.488791 kubelet[2728]: E0209 12:49:19.488790 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:49:19.489056 kubelet[2728]: E0209 12:49:19.488790 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:49:19.489056 kubelet[2728]: E0209 12:49:19.488807 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podUID=a361b76f-ced1-4e9c-8f8c-27ce35bfca6f Feb 9 12:49:19.489056 kubelet[2728]: E0209 12:49:19.488808 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1cd8082-cdbc-42e8-af70-b207780880fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-r6ph9" podUID=c1cd8082-cdbc-42e8-af70-b207780880fb Feb 9 12:49:21.461541 env[1555]: time="2024-02-09T12:49:21.461418073Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:49:21.488172 env[1555]: time="2024-02-09T12:49:21.488117884Z" level=error msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" failed" error="failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:49:21.488303 kubelet[2728]: E0209 12:49:21.488292 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:49:21.488486 kubelet[2728]: E0209 12:49:21.488317 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332} Feb 9 12:49:21.488486 kubelet[2728]: E0209 12:49:21.488339 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:49:21.488486 kubelet[2728]: E0209 12:49:21.488357 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d7559de-a11a-443c-bbd2-21f3384d343f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lnwr" podUID=3d7559de-a11a-443c-bbd2-21f3384d343f Feb 9 12:49:27.461107 env[1555]: time="2024-02-09T12:49:27.460969524Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:49:27.487142 env[1555]: time="2024-02-09T12:49:27.487108891Z" level=error msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" failed" error="failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:49:27.487283 kubelet[2728]: E0209 12:49:27.487273 2728 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:49:27.487485 kubelet[2728]: E0209 12:49:27.487297 2728 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1} Feb 9 12:49:27.487485 kubelet[2728]: E0209 12:49:27.487318 2728 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:49:27.487485 kubelet[2728]: E0209 12:49:27.487335 2728 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca9ba966-733c-4c50-9cea-076af2df5ddd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-l6lth" podUID=ca9ba966-733c-4c50-9cea-076af2df5ddd Feb 9 12:49:29.751284 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1566539676.mount: Deactivated successfully. Feb 9 12:49:29.773395 env[1555]: time="2024-02-09T12:49:29.773341128Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:49:29.774016 env[1555]: time="2024-02-09T12:49:29.773975600Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:49:29.774556 env[1555]: time="2024-02-09T12:49:29.774511485Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:49:29.775140 env[1555]: time="2024-02-09T12:49:29.775101970Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:49:29.775727 env[1555]: time="2024-02-09T12:49:29.775685265Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 12:49:29.779940 env[1555]: time="2024-02-09T12:49:29.779907784Z" level=info msg="CreateContainer within sandbox \"657e0b922938a09bf0b213e3b76995abaf0714d21e6b135a72ac36c9b1e9b8f1\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 12:49:29.784885 env[1555]: time="2024-02-09T12:49:29.784842075Z" level=info msg="CreateContainer within sandbox \"657e0b922938a09bf0b213e3b76995abaf0714d21e6b135a72ac36c9b1e9b8f1\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f86dbd02f5018aeceeec8e3cb528fa5dc19e6a8ac9860674cdcc1a032301ac59\"" Feb 9 12:49:29.785245 env[1555]: time="2024-02-09T12:49:29.785205732Z" level=info msg="StartContainer for \"f86dbd02f5018aeceeec8e3cb528fa5dc19e6a8ac9860674cdcc1a032301ac59\"" Feb 9 12:49:29.838790 env[1555]: time="2024-02-09T12:49:29.838754113Z" level=info msg="StartContainer for \"f86dbd02f5018aeceeec8e3cb528fa5dc19e6a8ac9860674cdcc1a032301ac59\" returns successfully" Feb 9 12:49:29.947854 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 12:49:29.947925 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 12:49:30.214470 kubelet[2728]: I0209 12:49:30.214414 2728 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-grlp7" podStartSLOduration=-9.223371798640463e+09 pod.CreationTimestamp="2024-02-09 12:45:32 +0000 UTC" firstStartedPulling="2024-02-09 12:45:34.245951147 +0000 UTC m=+20.964427957" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 12:49:30.213127853 +0000 UTC m=+256.931604768" watchObservedRunningTime="2024-02-09 12:49:30.214312483 +0000 UTC m=+256.932789335" Feb 9 12:49:30.460427 env[1555]: time="2024-02-09T12:49:30.460327384Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:49:30.557283 env[1555]: 2024-02-09 12:49:30.527 [INFO][5903] k8s.go 578: Cleaning up netns ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:49:30.557283 env[1555]: 2024-02-09 12:49:30.527 [INFO][5903] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" iface="eth0" netns="/var/run/netns/cni-481ba6d6-33b6-4c79-3617-806db866eb02" Feb 9 12:49:30.557283 env[1555]: 2024-02-09 12:49:30.528 [INFO][5903] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" iface="eth0" netns="/var/run/netns/cni-481ba6d6-33b6-4c79-3617-806db866eb02" Feb 9 12:49:30.557283 env[1555]: 2024-02-09 12:49:30.528 [INFO][5903] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" iface="eth0" netns="/var/run/netns/cni-481ba6d6-33b6-4c79-3617-806db866eb02" Feb 9 12:49:30.557283 env[1555]: 2024-02-09 12:49:30.528 [INFO][5903] k8s.go 585: Releasing IP address(es) ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:49:30.557283 env[1555]: 2024-02-09 12:49:30.528 [INFO][5903] utils.go 188: Calico CNI releasing IP address ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:49:30.557283 env[1555]: 2024-02-09 12:49:30.546 [INFO][5919] ipam_plugin.go 415: Releasing address using handleID ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" HandleID="k8s-pod-network.c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:49:30.557283 env[1555]: 2024-02-09 12:49:30.546 [INFO][5919] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:49:30.557283 env[1555]: 2024-02-09 12:49:30.546 [INFO][5919] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:49:30.557283 env[1555]: 2024-02-09 12:49:30.553 [WARNING][5919] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" HandleID="k8s-pod-network.c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:49:30.557283 env[1555]: 2024-02-09 12:49:30.553 [INFO][5919] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" HandleID="k8s-pod-network.c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:49:30.557283 env[1555]: 2024-02-09 12:49:30.555 [INFO][5919] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:49:30.557283 env[1555]: 2024-02-09 12:49:30.556 [INFO][5903] k8s.go 591: Teardown processing complete. ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:49:30.557872 env[1555]: time="2024-02-09T12:49:30.557362435Z" level=info msg="TearDown network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" successfully" Feb 9 12:49:30.557872 env[1555]: time="2024-02-09T12:49:30.557403277Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" returns successfully" Feb 9 12:49:30.558045 env[1555]: time="2024-02-09T12:49:30.557996430Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-r6ph9,Uid:c1cd8082-cdbc-42e8-af70-b207780880fb,Namespace:kube-system,Attempt:1,}" Feb 9 12:49:30.682152 systemd-networkd[1410]: cali20d5343214f: Link UP Feb 9 12:49:30.747891 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 12:49:30.747928 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali20d5343214f: link becomes ready Feb 9 12:49:30.747936 systemd-networkd[1410]: cali20d5343214f: Gained carrier Feb 9 12:49:30.752585 systemd[1]: run-netns-cni\x2d481ba6d6\x2d33b6\x2d4c79\x2d3617\x2d806db866eb02.mount: Deactivated successfully. Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.582 [INFO][5933] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.593 [INFO][5933] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0 coredns-787d4945fb- kube-system c1cd8082-cdbc-42e8-af70-b207780880fb 1124 0 2024-02-09 12:45:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-524ff09451 coredns-787d4945fb-r6ph9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali20d5343214f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" Namespace="kube-system" Pod="coredns-787d4945fb-r6ph9" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-" Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.593 [INFO][5933] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" Namespace="kube-system" Pod="coredns-787d4945fb-r6ph9" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.618 [INFO][5954] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" HandleID="k8s-pod-network.0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.629 [INFO][5954] ipam_plugin.go 268: Auto assigning IP ContainerID="0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" HandleID="k8s-pod-network.0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029c710), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-524ff09451", "pod":"coredns-787d4945fb-r6ph9", "timestamp":"2024-02-09 12:49:30.618692043 +0000 UTC"}, Hostname:"ci-3510.3.2-a-524ff09451", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.629 [INFO][5954] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.629 [INFO][5954] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.629 [INFO][5954] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-524ff09451' Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.631 [INFO][5954] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.636 [INFO][5954] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.639 [INFO][5954] ipam.go 489: Trying affinity for 192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.641 [INFO][5954] ipam.go 155: Attempting to load block cidr=192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.644 [INFO][5954] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.644 [INFO][5954] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.192/26 handle="k8s-pod-network.0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.645 [INFO][5954] ipam.go 1682: Creating new handle: k8s-pod-network.0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7 Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.650 [INFO][5954] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.192/26 handle="k8s-pod-network.0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.658 [INFO][5954] ipam.go 1216: Successfully claimed IPs: [192.168.90.193/26] block=192.168.90.192/26 handle="k8s-pod-network.0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.659 [INFO][5954] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.193/26] handle="k8s-pod-network.0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.659 [INFO][5954] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:49:30.753498 env[1555]: 2024-02-09 12:49:30.659 [INFO][5954] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.193/26] IPv6=[] ContainerID="0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" HandleID="k8s-pod-network.0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:49:30.753920 env[1555]: 2024-02-09 12:49:30.665 [INFO][5933] k8s.go 385: Populated endpoint ContainerID="0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" Namespace="kube-system" Pod="coredns-787d4945fb-r6ph9" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"c1cd8082-cdbc-42e8-af70-b207780880fb", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"", Pod:"coredns-787d4945fb-r6ph9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali20d5343214f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:49:30.753920 env[1555]: 2024-02-09 12:49:30.666 [INFO][5933] k8s.go 386: Calico CNI using IPs: [192.168.90.193/32] ContainerID="0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" Namespace="kube-system" Pod="coredns-787d4945fb-r6ph9" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:49:30.753920 env[1555]: 2024-02-09 12:49:30.667 [INFO][5933] dataplane_linux.go 68: Setting the host side veth name to cali20d5343214f ContainerID="0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" Namespace="kube-system" Pod="coredns-787d4945fb-r6ph9" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:49:30.753920 env[1555]: 2024-02-09 12:49:30.747 [INFO][5933] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" Namespace="kube-system" Pod="coredns-787d4945fb-r6ph9" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:49:30.753920 env[1555]: 2024-02-09 12:49:30.748 [INFO][5933] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" Namespace="kube-system" Pod="coredns-787d4945fb-r6ph9" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"c1cd8082-cdbc-42e8-af70-b207780880fb", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7", Pod:"coredns-787d4945fb-r6ph9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali20d5343214f", MAC:"a2:a0:cb:f7:94:09", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:49:30.753920 env[1555]: 2024-02-09 12:49:30.752 [INFO][5933] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7" Namespace="kube-system" Pod="coredns-787d4945fb-r6ph9" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:49:30.758947 env[1555]: time="2024-02-09T12:49:30.758864245Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:49:30.758947 env[1555]: time="2024-02-09T12:49:30.758885984Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:49:30.758947 env[1555]: time="2024-02-09T12:49:30.758893095Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:49:30.759038 env[1555]: time="2024-02-09T12:49:30.759000140Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7 pid=5992 runtime=io.containerd.runc.v2 Feb 9 12:49:30.799412 env[1555]: time="2024-02-09T12:49:30.799370052Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-r6ph9,Uid:c1cd8082-cdbc-42e8-af70-b207780880fb,Namespace:kube-system,Attempt:1,} returns sandbox id \"0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7\"" Feb 9 12:49:30.800696 env[1555]: time="2024-02-09T12:49:30.800653199Z" level=info msg="CreateContainer within sandbox \"0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 12:49:30.804690 env[1555]: time="2024-02-09T12:49:30.804645118Z" level=info msg="CreateContainer within sandbox \"0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e7223bfae2a5e5f28995929ba820770e451b8ea1d2f1f186ba31b8841fb74900\"" Feb 9 12:49:30.804917 env[1555]: time="2024-02-09T12:49:30.804877026Z" level=info msg="StartContainer for \"e7223bfae2a5e5f28995929ba820770e451b8ea1d2f1f186ba31b8841fb74900\"" Feb 9 12:49:30.848028 env[1555]: time="2024-02-09T12:49:30.847940837Z" level=info msg="StartContainer for \"e7223bfae2a5e5f28995929ba820770e451b8ea1d2f1f186ba31b8841fb74900\" returns successfully" Feb 9 12:49:31.103000 audit[6119]: AVC avc: denied { write } for pid=6119 comm="tee" name="fd" dev="proc" ino=47293 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:49:31.103000 audit[6120]: AVC avc: denied { write } for pid=6120 comm="tee" name="fd" dev="proc" ino=38854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:49:31.192620 kubelet[2728]: I0209 12:49:31.192601 2728 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-r6ph9" podStartSLOduration=243.192575218 pod.CreationTimestamp="2024-02-09 12:45:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 12:49:31.192179786 +0000 UTC m=+257.910656595" watchObservedRunningTime="2024-02-09 12:49:31.192575218 +0000 UTC m=+257.911052030" Feb 9 12:49:31.231190 kernel: audit: type=1400 audit(1707482971.103:286): avc: denied { write } for pid=6119 comm="tee" name="fd" dev="proc" ino=47293 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:49:31.231254 kernel: audit: type=1400 audit(1707482971.103:287): avc: denied { write } for pid=6120 comm="tee" name="fd" dev="proc" ino=38854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:49:31.231272 kernel: audit: type=1300 audit(1707482971.103:286): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc220ab96d a2=241 a3=1b6 items=1 ppid=6079 pid=6119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.103000 audit[6119]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc220ab96d a2=241 a3=1b6 items=1 ppid=6079 pid=6119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.325974 kernel: audit: type=1307 audit(1707482971.103:286): cwd="/etc/service/enabled/bird6/log" Feb 9 12:49:31.103000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 12:49:31.103000 audit[6120]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0e6ef96f a2=241 a3=1b6 items=1 ppid=6080 pid=6120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.449839 kernel: audit: type=1300 audit(1707482971.103:287): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0e6ef96f a2=241 a3=1b6 items=1 ppid=6080 pid=6120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.449910 kernel: audit: type=1302 audit(1707482971.103:286): item=0 name="/dev/fd/63" inode=47290 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:49:31.103000 audit: PATH item=0 name="/dev/fd/63" inode=47290 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:49:31.513465 kernel: audit: type=1307 audit(1707482971.103:287): cwd="/etc/service/enabled/cni/log" Feb 9 12:49:31.103000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 12:49:31.542710 kernel: audit: type=1327 audit(1707482971.103:286): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:49:31.103000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:49:31.602917 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 12:49:31.602949 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 12:49:31.103000 audit: PATH item=0 name="/dev/fd/63" inode=45275 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:49:31.103000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:49:31.103000 audit[6121]: AVC avc: denied { write } for pid=6121 comm="tee" name="fd" dev="proc" ino=48256 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:49:31.103000 audit[6121]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc48b795e a2=241 a3=1b6 items=1 ppid=6082 pid=6121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.103000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 12:49:31.103000 audit: PATH item=0 name="/dev/fd/63" inode=48253 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:49:31.103000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:49:31.103000 audit[6118]: AVC avc: denied { write } for pid=6118 comm="tee" name="fd" dev="proc" ino=45278 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:49:31.103000 audit[6118]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd27a9096d a2=241 a3=1b6 items=1 ppid=6081 pid=6118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.103000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 12:49:31.103000 audit: PATH item=0 name="/dev/fd/63" inode=38851 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:49:31.103000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:49:31.103000 audit[6125]: AVC avc: denied { write } for pid=6125 comm="tee" name="fd" dev="proc" ino=35766 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:49:31.103000 audit[6125]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef91de96e a2=241 a3=1b6 items=1 ppid=6084 pid=6125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.103000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 12:49:31.103000 audit: PATH item=0 name="/dev/fd/63" inode=34674 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:49:31.103000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:49:31.104000 audit[6122]: AVC avc: denied { write } for pid=6122 comm="tee" name="fd" dev="proc" ino=42264 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:49:31.104000 audit[6110]: AVC avc: denied { write } for pid=6110 comm="tee" name="fd" dev="proc" ino=46201 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:49:31.104000 audit[6122]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8516696d a2=241 a3=1b6 items=1 ppid=6083 pid=6122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.104000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 12:49:31.104000 audit[6110]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4cf4295d a2=241 a3=1b6 items=1 ppid=6078 pid=6110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.104000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 12:49:31.104000 audit: PATH item=0 name="/dev/fd/63" inode=41468 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:49:31.104000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:49:31.104000 audit: PATH item=0 name="/dev/fd/63" inode=35763 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:49:31.104000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:49:31.212000 audit[6282]: NETFILTER_CFG table=filter:111 family=2 entries=12 op=nft_register_rule pid=6282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:31.212000 audit[6282]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fff6200caa0 a2=0 a3=7fff6200ca8c items=0 ppid=2992 pid=6282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.212000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:31.326000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.326000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.326000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.326000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.326000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.326000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.326000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.326000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.212000 audit[6282]: NETFILTER_CFG table=nat:112 family=2 entries=30 op=nft_register_rule pid=6282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:31.212000 audit[6282]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fff6200caa0 a2=0 a3=7fff6200ca8c items=0 ppid=2992 pid=6282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.212000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:31.326000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.326000 audit: BPF prog-id=10 op=LOAD Feb 9 12:49:31.326000 audit[6291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffde047ed90 a2=70 a3=7fdfa2f88000 items=0 ppid=6091 pid=6291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 12:49:31.512000 audit: BPF prog-id=10 op=UNLOAD Feb 9 12:49:31.512000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.512000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.512000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.512000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.512000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.512000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.512000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.512000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.512000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.512000 audit[6291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffde047ed90 a2=70 a3=6e items=0 ppid=6091 pid=6291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.512000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 12:49:31.655000 audit: BPF prog-id=11 op=UNLOAD Feb 9 12:49:31.655000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.655000 audit[6291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffde047ed40 a2=70 a3=7ffde047ed90 items=0 ppid=6091 pid=6291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 12:49:31.655000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.655000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.655000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.655000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.655000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.655000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.655000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.655000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.655000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.655000 audit: BPF prog-id=12 op=LOAD Feb 9 12:49:31.655000 audit[6291]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffde047ed20 a2=70 a3=7ffde047ed90 items=0 ppid=6091 pid=6291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 12:49:31.655000 audit: BPF prog-id=12 op=UNLOAD Feb 9 12:49:31.655000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.655000 audit[6291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde047ee00 a2=70 a3=0 items=0 ppid=6091 pid=6291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 12:49:31.655000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.655000 audit[6291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde047edf0 a2=70 a3=0 items=0 ppid=6091 pid=6291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 12:49:31.656000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.656000 audit[6291]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffde047ee30 a2=70 a3=0 items=0 ppid=6091 pid=6291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 12:49:31.656000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.656000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.656000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.656000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.656000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.656000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.656000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.656000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.656000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.656000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.656000 audit: BPF prog-id=13 op=LOAD Feb 9 12:49:31.656000 audit[6291]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffde047ed50 a2=70 a3=ffffffff items=0 ppid=6091 pid=6291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 12:49:31.657000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.657000 audit[6344]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeae306a0 a2=70 a3=fff80800 items=0 ppid=6091 pid=6344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.657000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 12:49:31.657000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:49:31.657000 audit[6344]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeae30570 a2=70 a3=3 items=0 ppid=6091 pid=6344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.657000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 12:49:31.672000 audit: BPF prog-id=13 op=UNLOAD Feb 9 12:49:31.699000 audit[6370]: NETFILTER_CFG table=raw:113 family=2 entries=19 op=nft_register_chain pid=6370 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 12:49:31.699000 audit[6370]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffdde360a20 a2=0 a3=7ffdde360a0c items=0 ppid=6091 pid=6370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.699000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 12:49:31.699000 audit[6375]: NETFILTER_CFG table=mangle:114 family=2 entries=19 op=nft_register_chain pid=6375 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 12:49:31.699000 audit[6375]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffc566f7540 a2=0 a3=5626b7fe2000 items=0 ppid=6091 pid=6375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.699000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 12:49:31.699000 audit[6371]: NETFILTER_CFG table=nat:115 family=2 entries=16 op=nft_register_chain pid=6371 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 12:49:31.699000 audit[6371]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fffad329f00 a2=0 a3=55a9d3d7e000 items=0 ppid=6091 pid=6371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.699000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 12:49:31.700000 audit[6374]: NETFILTER_CFG table=filter:116 family=2 entries=71 op=nft_register_chain pid=6374 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 12:49:31.700000 audit[6374]: SYSCALL arch=c000003e syscall=46 success=yes exit=36636 a0=3 a1=7ffe78c480e0 a2=0 a3=55fe858aa000 items=0 ppid=6091 pid=6374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:31.700000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 12:49:32.163707 systemd-networkd[1410]: cali20d5343214f: Gained IPv6LL Feb 9 12:49:32.201675 systemd-networkd[1410]: vxlan.calico: Link UP Feb 9 12:49:32.201679 systemd-networkd[1410]: vxlan.calico: Gained carrier Feb 9 12:49:32.223000 audit[6407]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=6407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:32.223000 audit[6407]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdcca2dde0 a2=0 a3=7ffdcca2ddcc items=0 ppid=2992 pid=6407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:32.223000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:32.224000 audit[6407]: NETFILTER_CFG table=nat:118 family=2 entries=51 op=nft_register_chain pid=6407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:32.224000 audit[6407]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffdcca2dde0 a2=0 a3=7ffdcca2ddcc items=0 ppid=2992 pid=6407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:32.224000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:33.459518 env[1555]: time="2024-02-09T12:49:33.459462227Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:49:33.506360 env[1555]: 2024-02-09 12:49:33.484 [INFO][6428] k8s.go 578: Cleaning up netns ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:49:33.506360 env[1555]: 2024-02-09 12:49:33.484 [INFO][6428] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" iface="eth0" netns="/var/run/netns/cni-fd21eedb-fdba-2a39-51d9-ed80d1ebae9e" Feb 9 12:49:33.506360 env[1555]: 2024-02-09 12:49:33.484 [INFO][6428] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" iface="eth0" netns="/var/run/netns/cni-fd21eedb-fdba-2a39-51d9-ed80d1ebae9e" Feb 9 12:49:33.506360 env[1555]: 2024-02-09 12:49:33.484 [INFO][6428] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" iface="eth0" netns="/var/run/netns/cni-fd21eedb-fdba-2a39-51d9-ed80d1ebae9e" Feb 9 12:49:33.506360 env[1555]: 2024-02-09 12:49:33.484 [INFO][6428] k8s.go 585: Releasing IP address(es) ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:49:33.506360 env[1555]: 2024-02-09 12:49:33.484 [INFO][6428] utils.go 188: Calico CNI releasing IP address ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:49:33.506360 env[1555]: 2024-02-09 12:49:33.496 [INFO][6443] ipam_plugin.go 415: Releasing address using handleID ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" HandleID="k8s-pod-network.f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:49:33.506360 env[1555]: 2024-02-09 12:49:33.496 [INFO][6443] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:49:33.506360 env[1555]: 2024-02-09 12:49:33.496 [INFO][6443] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:49:33.506360 env[1555]: 2024-02-09 12:49:33.502 [WARNING][6443] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" HandleID="k8s-pod-network.f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:49:33.506360 env[1555]: 2024-02-09 12:49:33.502 [INFO][6443] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" HandleID="k8s-pod-network.f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:49:33.506360 env[1555]: 2024-02-09 12:49:33.504 [INFO][6443] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:49:33.506360 env[1555]: 2024-02-09 12:49:33.505 [INFO][6428] k8s.go 591: Teardown processing complete. ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:49:33.506936 env[1555]: time="2024-02-09T12:49:33.506468698Z" level=info msg="TearDown network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" successfully" Feb 9 12:49:33.506936 env[1555]: time="2024-02-09T12:49:33.506498826Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" returns successfully" Feb 9 12:49:33.507032 env[1555]: time="2024-02-09T12:49:33.507007659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7cb69b6b86-5vkkn,Uid:a361b76f-ced1-4e9c-8f8c-27ce35bfca6f,Namespace:calico-system,Attempt:1,}" Feb 9 12:49:33.509046 systemd[1]: run-netns-cni\x2dfd21eedb\x2dfdba\x2d2a39\x2d51d9\x2ded80d1ebae9e.mount: Deactivated successfully. Feb 9 12:49:33.572522 systemd-networkd[1410]: vxlan.calico: Gained IPv6LL Feb 9 12:49:33.634533 systemd-networkd[1410]: cali0136f19d70a: Link UP Feb 9 12:49:33.671401 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 12:49:33.671465 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0136f19d70a: link becomes ready Feb 9 12:49:33.698535 systemd-networkd[1410]: cali0136f19d70a: Gained carrier Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.543 [INFO][6460] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0 calico-kube-controllers-7cb69b6b86- calico-system a361b76f-ced1-4e9c-8f8c-27ce35bfca6f 1145 0 2024-02-09 12:45:33 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7cb69b6b86 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-524ff09451 calico-kube-controllers-7cb69b6b86-5vkkn eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali0136f19d70a [] []}} ContainerID="e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" Namespace="calico-system" Pod="calico-kube-controllers-7cb69b6b86-5vkkn" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-" Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.543 [INFO][6460] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" Namespace="calico-system" Pod="calico-kube-controllers-7cb69b6b86-5vkkn" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.569 [INFO][6482] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" HandleID="k8s-pod-network.e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.580 [INFO][6482] ipam_plugin.go 268: Auto assigning IP ContainerID="e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" HandleID="k8s-pod-network.e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003304a0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-524ff09451", "pod":"calico-kube-controllers-7cb69b6b86-5vkkn", "timestamp":"2024-02-09 12:49:33.569141555 +0000 UTC"}, Hostname:"ci-3510.3.2-a-524ff09451", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.580 [INFO][6482] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.580 [INFO][6482] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.580 [INFO][6482] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-524ff09451' Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.583 [INFO][6482] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.589 [INFO][6482] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.597 [INFO][6482] ipam.go 489: Trying affinity for 192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.601 [INFO][6482] ipam.go 155: Attempting to load block cidr=192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.606 [INFO][6482] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.606 [INFO][6482] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.192/26 handle="k8s-pod-network.e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.610 [INFO][6482] ipam.go 1682: Creating new handle: k8s-pod-network.e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.616 [INFO][6482] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.192/26 handle="k8s-pod-network.e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.627 [INFO][6482] ipam.go 1216: Successfully claimed IPs: [192.168.90.194/26] block=192.168.90.192/26 handle="k8s-pod-network.e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.627 [INFO][6482] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.194/26] handle="k8s-pod-network.e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.627 [INFO][6482] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:49:33.703873 env[1555]: 2024-02-09 12:49:33.627 [INFO][6482] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.194/26] IPv6=[] ContainerID="e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" HandleID="k8s-pod-network.e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:49:33.704353 env[1555]: 2024-02-09 12:49:33.631 [INFO][6460] k8s.go 385: Populated endpoint ContainerID="e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" Namespace="calico-system" Pod="calico-kube-controllers-7cb69b6b86-5vkkn" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0", GenerateName:"calico-kube-controllers-7cb69b6b86-", Namespace:"calico-system", SelfLink:"", UID:"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f", ResourceVersion:"1145", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7cb69b6b86", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"", Pod:"calico-kube-controllers-7cb69b6b86-5vkkn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.90.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0136f19d70a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:49:33.704353 env[1555]: 2024-02-09 12:49:33.631 [INFO][6460] k8s.go 386: Calico CNI using IPs: [192.168.90.194/32] ContainerID="e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" Namespace="calico-system" Pod="calico-kube-controllers-7cb69b6b86-5vkkn" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:49:33.704353 env[1555]: 2024-02-09 12:49:33.631 [INFO][6460] dataplane_linux.go 68: Setting the host side veth name to cali0136f19d70a ContainerID="e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" Namespace="calico-system" Pod="calico-kube-controllers-7cb69b6b86-5vkkn" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:49:33.704353 env[1555]: 2024-02-09 12:49:33.698 [INFO][6460] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" Namespace="calico-system" Pod="calico-kube-controllers-7cb69b6b86-5vkkn" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:49:33.704353 env[1555]: 2024-02-09 12:49:33.698 [INFO][6460] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" Namespace="calico-system" Pod="calico-kube-controllers-7cb69b6b86-5vkkn" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0", GenerateName:"calico-kube-controllers-7cb69b6b86-", Namespace:"calico-system", SelfLink:"", UID:"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f", ResourceVersion:"1145", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7cb69b6b86", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d", Pod:"calico-kube-controllers-7cb69b6b86-5vkkn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.90.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0136f19d70a", MAC:"32:49:75:08:27:02", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:49:33.704353 env[1555]: 2024-02-09 12:49:33.703 [INFO][6460] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d" Namespace="calico-system" Pod="calico-kube-controllers-7cb69b6b86-5vkkn" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:49:33.709349 env[1555]: time="2024-02-09T12:49:33.709312457Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:49:33.709349 env[1555]: time="2024-02-09T12:49:33.709334403Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:49:33.709349 env[1555]: time="2024-02-09T12:49:33.709345208Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:49:33.709545 env[1555]: time="2024-02-09T12:49:33.709505951Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d pid=6524 runtime=io.containerd.runc.v2 Feb 9 12:49:33.710000 audit[6535]: NETFILTER_CFG table=filter:119 family=2 entries=40 op=nft_register_chain pid=6535 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 12:49:33.710000 audit[6535]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffc7d66ade0 a2=0 a3=7ffc7d66adcc items=0 ppid=6091 pid=6535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:33.710000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 12:49:33.760854 env[1555]: time="2024-02-09T12:49:33.760830498Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7cb69b6b86-5vkkn,Uid:a361b76f-ced1-4e9c-8f8c-27ce35bfca6f,Namespace:calico-system,Attempt:1,} returns sandbox id \"e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d\"" Feb 9 12:49:33.761467 env[1555]: time="2024-02-09T12:49:33.761455508Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 12:49:35.299674 systemd-networkd[1410]: cali0136f19d70a: Gained IPv6LL Feb 9 12:49:35.460942 env[1555]: time="2024-02-09T12:49:35.460811578Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:49:35.555551 env[1555]: 2024-02-09 12:49:35.528 [INFO][6576] k8s.go 578: Cleaning up netns ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:49:35.555551 env[1555]: 2024-02-09 12:49:35.529 [INFO][6576] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" iface="eth0" netns="/var/run/netns/cni-31d3ac81-a52c-7d40-77e3-95c128f51f37" Feb 9 12:49:35.555551 env[1555]: 2024-02-09 12:49:35.529 [INFO][6576] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" iface="eth0" netns="/var/run/netns/cni-31d3ac81-a52c-7d40-77e3-95c128f51f37" Feb 9 12:49:35.555551 env[1555]: 2024-02-09 12:49:35.529 [INFO][6576] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" iface="eth0" netns="/var/run/netns/cni-31d3ac81-a52c-7d40-77e3-95c128f51f37" Feb 9 12:49:35.555551 env[1555]: 2024-02-09 12:49:35.529 [INFO][6576] k8s.go 585: Releasing IP address(es) ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:49:35.555551 env[1555]: 2024-02-09 12:49:35.529 [INFO][6576] utils.go 188: Calico CNI releasing IP address ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:49:35.555551 env[1555]: 2024-02-09 12:49:35.546 [INFO][6593] ipam_plugin.go 415: Releasing address using handleID ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" HandleID="k8s-pod-network.a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Workload="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:49:35.555551 env[1555]: 2024-02-09 12:49:35.546 [INFO][6593] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:49:35.555551 env[1555]: 2024-02-09 12:49:35.546 [INFO][6593] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:49:35.555551 env[1555]: 2024-02-09 12:49:35.552 [WARNING][6593] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" HandleID="k8s-pod-network.a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Workload="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:49:35.555551 env[1555]: 2024-02-09 12:49:35.552 [INFO][6593] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" HandleID="k8s-pod-network.a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Workload="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:49:35.555551 env[1555]: 2024-02-09 12:49:35.553 [INFO][6593] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:49:35.555551 env[1555]: 2024-02-09 12:49:35.554 [INFO][6576] k8s.go 591: Teardown processing complete. ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:49:35.556007 env[1555]: time="2024-02-09T12:49:35.555611847Z" level=info msg="TearDown network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" successfully" Feb 9 12:49:35.556007 env[1555]: time="2024-02-09T12:49:35.555641128Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" returns successfully" Feb 9 12:49:35.556127 env[1555]: time="2024-02-09T12:49:35.556107004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2lnwr,Uid:3d7559de-a11a-443c-bbd2-21f3384d343f,Namespace:calico-system,Attempt:1,}" Feb 9 12:49:35.557926 systemd[1]: run-netns-cni\x2d31d3ac81\x2da52c\x2d7d40\x2d77e3\x2d95c128f51f37.mount: Deactivated successfully. Feb 9 12:49:35.637710 systemd-networkd[1410]: cali5da492533d9: Link UP Feb 9 12:49:35.690059 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 12:49:35.690129 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5da492533d9: link becomes ready Feb 9 12:49:35.690278 systemd-networkd[1410]: cali5da492533d9: Gained carrier Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.586 [INFO][6609] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0 csi-node-driver- calico-system 3d7559de-a11a-443c-bbd2-21f3384d343f 1154 0 2024-02-09 12:45:32 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-524ff09451 csi-node-driver-2lnwr eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali5da492533d9 [] []}} ContainerID="baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" Namespace="calico-system" Pod="csi-node-driver-2lnwr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-" Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.586 [INFO][6609] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" Namespace="calico-system" Pod="csi-node-driver-2lnwr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.606 [INFO][6634] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" HandleID="k8s-pod-network.baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" Workload="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.614 [INFO][6634] ipam_plugin.go 268: Auto assigning IP ContainerID="baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" HandleID="k8s-pod-network.baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" Workload="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000511c0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-524ff09451", "pod":"csi-node-driver-2lnwr", "timestamp":"2024-02-09 12:49:35.606650192 +0000 UTC"}, Hostname:"ci-3510.3.2-a-524ff09451", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.615 [INFO][6634] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.615 [INFO][6634] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.615 [INFO][6634] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-524ff09451' Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.616 [INFO][6634] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.620 [INFO][6634] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.623 [INFO][6634] ipam.go 489: Trying affinity for 192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.625 [INFO][6634] ipam.go 155: Attempting to load block cidr=192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.627 [INFO][6634] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.627 [INFO][6634] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.192/26 handle="k8s-pod-network.baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.628 [INFO][6634] ipam.go 1682: Creating new handle: k8s-pod-network.baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2 Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.631 [INFO][6634] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.192/26 handle="k8s-pod-network.baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.634 [INFO][6634] ipam.go 1216: Successfully claimed IPs: [192.168.90.195/26] block=192.168.90.192/26 handle="k8s-pod-network.baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.634 [INFO][6634] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.195/26] handle="k8s-pod-network.baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.634 [INFO][6634] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:49:35.695200 env[1555]: 2024-02-09 12:49:35.634 [INFO][6634] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.195/26] IPv6=[] ContainerID="baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" HandleID="k8s-pod-network.baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" Workload="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:49:35.695748 env[1555]: 2024-02-09 12:49:35.636 [INFO][6609] k8s.go 385: Populated endpoint ContainerID="baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" Namespace="calico-system" Pod="csi-node-driver-2lnwr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3d7559de-a11a-443c-bbd2-21f3384d343f", ResourceVersion:"1154", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"", Pod:"csi-node-driver-2lnwr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.90.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5da492533d9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:49:35.695748 env[1555]: 2024-02-09 12:49:35.636 [INFO][6609] k8s.go 386: Calico CNI using IPs: [192.168.90.195/32] ContainerID="baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" Namespace="calico-system" Pod="csi-node-driver-2lnwr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:49:35.695748 env[1555]: 2024-02-09 12:49:35.636 [INFO][6609] dataplane_linux.go 68: Setting the host side veth name to cali5da492533d9 ContainerID="baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" Namespace="calico-system" Pod="csi-node-driver-2lnwr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:49:35.695748 env[1555]: 2024-02-09 12:49:35.690 [INFO][6609] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" Namespace="calico-system" Pod="csi-node-driver-2lnwr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:49:35.695748 env[1555]: 2024-02-09 12:49:35.690 [INFO][6609] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" Namespace="calico-system" Pod="csi-node-driver-2lnwr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3d7559de-a11a-443c-bbd2-21f3384d343f", ResourceVersion:"1154", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2", Pod:"csi-node-driver-2lnwr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.90.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5da492533d9", MAC:"52:b0:0e:91:64:63", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:49:35.695748 env[1555]: 2024-02-09 12:49:35.694 [INFO][6609] k8s.go 491: Wrote updated endpoint to datastore ContainerID="baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2" Namespace="calico-system" Pod="csi-node-driver-2lnwr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:49:35.701306 env[1555]: time="2024-02-09T12:49:35.701268695Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:49:35.701306 env[1555]: time="2024-02-09T12:49:35.701293627Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:49:35.701306 env[1555]: time="2024-02-09T12:49:35.701304066Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:49:35.701455 env[1555]: time="2024-02-09T12:49:35.701371723Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2 pid=6675 runtime=io.containerd.runc.v2 Feb 9 12:49:35.701000 audit[6681]: NETFILTER_CFG table=filter:120 family=2 entries=38 op=nft_register_chain pid=6681 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 12:49:35.701000 audit[6681]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7ffd032680c0 a2=0 a3=7ffd032680ac items=0 ppid=6091 pid=6681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:35.701000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 12:49:35.747832 env[1555]: time="2024-02-09T12:49:35.747670543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2lnwr,Uid:3d7559de-a11a-443c-bbd2-21f3384d343f,Namespace:calico-system,Attempt:1,} returns sandbox id \"baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2\"" Feb 9 12:49:37.027732 systemd-networkd[1410]: cali5da492533d9: Gained IPv6LL Feb 9 12:49:39.461383 env[1555]: time="2024-02-09T12:49:39.461290315Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:49:39.581082 env[1555]: 2024-02-09 12:49:39.540 [INFO][6732] k8s.go 578: Cleaning up netns ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:49:39.581082 env[1555]: 2024-02-09 12:49:39.541 [INFO][6732] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" iface="eth0" netns="/var/run/netns/cni-1e881428-5673-6212-3327-0bb99d230f51" Feb 9 12:49:39.581082 env[1555]: 2024-02-09 12:49:39.541 [INFO][6732] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" iface="eth0" netns="/var/run/netns/cni-1e881428-5673-6212-3327-0bb99d230f51" Feb 9 12:49:39.581082 env[1555]: 2024-02-09 12:49:39.541 [INFO][6732] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" iface="eth0" netns="/var/run/netns/cni-1e881428-5673-6212-3327-0bb99d230f51" Feb 9 12:49:39.581082 env[1555]: 2024-02-09 12:49:39.541 [INFO][6732] k8s.go 585: Releasing IP address(es) ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:49:39.581082 env[1555]: 2024-02-09 12:49:39.541 [INFO][6732] utils.go 188: Calico CNI releasing IP address ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:49:39.581082 env[1555]: 2024-02-09 12:49:39.566 [INFO][6750] ipam_plugin.go 415: Releasing address using handleID ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" HandleID="k8s-pod-network.d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:49:39.581082 env[1555]: 2024-02-09 12:49:39.566 [INFO][6750] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:49:39.581082 env[1555]: 2024-02-09 12:49:39.566 [INFO][6750] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:49:39.581082 env[1555]: 2024-02-09 12:49:39.575 [WARNING][6750] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" HandleID="k8s-pod-network.d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:49:39.581082 env[1555]: 2024-02-09 12:49:39.575 [INFO][6750] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" HandleID="k8s-pod-network.d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:49:39.581082 env[1555]: 2024-02-09 12:49:39.577 [INFO][6750] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:49:39.581082 env[1555]: 2024-02-09 12:49:39.579 [INFO][6732] k8s.go 591: Teardown processing complete. ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:49:39.582265 env[1555]: time="2024-02-09T12:49:39.581286380Z" level=info msg="TearDown network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" successfully" Feb 9 12:49:39.582265 env[1555]: time="2024-02-09T12:49:39.581342829Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" returns successfully" Feb 9 12:49:39.582265 env[1555]: time="2024-02-09T12:49:39.582097814Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-l6lth,Uid:ca9ba966-733c-4c50-9cea-076af2df5ddd,Namespace:kube-system,Attempt:1,}" Feb 9 12:49:39.585476 systemd[1]: run-netns-cni\x2d1e881428\x2d5673\x2d6212\x2d3327\x2d0bb99d230f51.mount: Deactivated successfully. Feb 9 12:49:39.686419 systemd-networkd[1410]: cali959b849153d: Link UP Feb 9 12:49:39.737596 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 12:49:39.737663 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali959b849153d: link becomes ready Feb 9 12:49:39.737672 systemd-networkd[1410]: cali959b849153d: Gained carrier Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.625 [INFO][6765] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0 coredns-787d4945fb- kube-system ca9ba966-733c-4c50-9cea-076af2df5ddd 1167 0 2024-02-09 12:45:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-524ff09451 coredns-787d4945fb-l6lth eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali959b849153d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" Namespace="kube-system" Pod="coredns-787d4945fb-l6lth" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-" Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.625 [INFO][6765] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" Namespace="kube-system" Pod="coredns-787d4945fb-l6lth" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.651 [INFO][6787] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" HandleID="k8s-pod-network.73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.660 [INFO][6787] ipam_plugin.go 268: Auto assigning IP ContainerID="73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" HandleID="k8s-pod-network.73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029d910), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-524ff09451", "pod":"coredns-787d4945fb-l6lth", "timestamp":"2024-02-09 12:49:39.651096416 +0000 UTC"}, Hostname:"ci-3510.3.2-a-524ff09451", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.661 [INFO][6787] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.661 [INFO][6787] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.661 [INFO][6787] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-524ff09451' Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.662 [INFO][6787] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.666 [INFO][6787] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.670 [INFO][6787] ipam.go 489: Trying affinity for 192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.672 [INFO][6787] ipam.go 155: Attempting to load block cidr=192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.674 [INFO][6787] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.674 [INFO][6787] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.192/26 handle="k8s-pod-network.73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.676 [INFO][6787] ipam.go 1682: Creating new handle: k8s-pod-network.73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164 Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.679 [INFO][6787] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.192/26 handle="k8s-pod-network.73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.683 [INFO][6787] ipam.go 1216: Successfully claimed IPs: [192.168.90.196/26] block=192.168.90.192/26 handle="k8s-pod-network.73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.683 [INFO][6787] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.196/26] handle="k8s-pod-network.73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.683 [INFO][6787] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:49:39.743552 env[1555]: 2024-02-09 12:49:39.683 [INFO][6787] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.196/26] IPv6=[] ContainerID="73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" HandleID="k8s-pod-network.73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:49:39.744047 env[1555]: 2024-02-09 12:49:39.685 [INFO][6765] k8s.go 385: Populated endpoint ContainerID="73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" Namespace="kube-system" Pod="coredns-787d4945fb-l6lth" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"ca9ba966-733c-4c50-9cea-076af2df5ddd", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"", Pod:"coredns-787d4945fb-l6lth", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali959b849153d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:49:39.744047 env[1555]: 2024-02-09 12:49:39.685 [INFO][6765] k8s.go 386: Calico CNI using IPs: [192.168.90.196/32] ContainerID="73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" Namespace="kube-system" Pod="coredns-787d4945fb-l6lth" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:49:39.744047 env[1555]: 2024-02-09 12:49:39.685 [INFO][6765] dataplane_linux.go 68: Setting the host side veth name to cali959b849153d ContainerID="73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" Namespace="kube-system" Pod="coredns-787d4945fb-l6lth" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:49:39.744047 env[1555]: 2024-02-09 12:49:39.737 [INFO][6765] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" Namespace="kube-system" Pod="coredns-787d4945fb-l6lth" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:49:39.744047 env[1555]: 2024-02-09 12:49:39.737 [INFO][6765] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" Namespace="kube-system" Pod="coredns-787d4945fb-l6lth" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"ca9ba966-733c-4c50-9cea-076af2df5ddd", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164", Pod:"coredns-787d4945fb-l6lth", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali959b849153d", MAC:"8a:7e:8b:ad:bd:eb", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:49:39.744047 env[1555]: 2024-02-09 12:49:39.742 [INFO][6765] k8s.go 491: Wrote updated endpoint to datastore ContainerID="73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164" Namespace="kube-system" Pod="coredns-787d4945fb-l6lth" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:49:39.749256 env[1555]: time="2024-02-09T12:49:39.749224033Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:49:39.749256 env[1555]: time="2024-02-09T12:49:39.749244619Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:49:39.749256 env[1555]: time="2024-02-09T12:49:39.749251447Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:49:39.749398 env[1555]: time="2024-02-09T12:49:39.749320381Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164 pid=6831 runtime=io.containerd.runc.v2 Feb 9 12:49:39.748000 audit[6830]: NETFILTER_CFG table=filter:121 family=2 entries=38 op=nft_register_chain pid=6830 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 12:49:39.773309 kernel: kauditd_printk_skb: 128 callbacks suppressed Feb 9 12:49:39.773348 kernel: audit: type=1325 audit(1707482979.748:317): table=filter:121 family=2 entries=38 op=nft_register_chain pid=6830 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 12:49:39.748000 audit[6830]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffecad4f9f0 a2=0 a3=7ffecad4f9dc items=0 ppid=6091 pid=6830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:39.826400 kernel: audit: type=1300 audit(1707482979.748:317): arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffecad4f9f0 a2=0 a3=7ffecad4f9dc items=0 ppid=6091 pid=6830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:39.748000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 12:49:39.970052 kernel: audit: type=1327 audit(1707482979.748:317): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 12:49:40.000105 env[1555]: time="2024-02-09T12:49:40.000046991Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-l6lth,Uid:ca9ba966-733c-4c50-9cea-076af2df5ddd,Namespace:kube-system,Attempt:1,} returns sandbox id \"73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164\"" Feb 9 12:49:40.001208 env[1555]: time="2024-02-09T12:49:40.001167387Z" level=info msg="CreateContainer within sandbox \"73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 12:49:40.004805 env[1555]: time="2024-02-09T12:49:40.004790559Z" level=info msg="CreateContainer within sandbox \"73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3726d7be85bca931d59e5628d2912368c1f7c2e61058b5c313e377f61a91af27\"" Feb 9 12:49:40.004991 env[1555]: time="2024-02-09T12:49:40.004978533Z" level=info msg="StartContainer for \"3726d7be85bca931d59e5628d2912368c1f7c2e61058b5c313e377f61a91af27\"" Feb 9 12:49:40.052386 env[1555]: time="2024-02-09T12:49:40.052338924Z" level=info msg="StartContainer for \"3726d7be85bca931d59e5628d2912368c1f7c2e61058b5c313e377f61a91af27\" returns successfully" Feb 9 12:49:40.230850 kubelet[2728]: I0209 12:49:40.230813 2728 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-l6lth" podStartSLOduration=252.230762253 pod.CreationTimestamp="2024-02-09 12:45:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 12:49:40.230503254 +0000 UTC m=+266.948980102" watchObservedRunningTime="2024-02-09 12:49:40.230762253 +0000 UTC m=+266.949239075" Feb 9 12:49:40.295000 audit[6938]: NETFILTER_CFG table=filter:122 family=2 entries=6 op=nft_register_rule pid=6938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:40.295000 audit[6938]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcaad34c20 a2=0 a3=7ffcaad34c0c items=0 ppid=2992 pid=6938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:40.441392 kernel: audit: type=1325 audit(1707482980.295:318): table=filter:122 family=2 entries=6 op=nft_register_rule pid=6938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:40.441430 kernel: audit: type=1300 audit(1707482980.295:318): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcaad34c20 a2=0 a3=7ffcaad34c0c items=0 ppid=2992 pid=6938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:40.441457 kernel: audit: type=1327 audit(1707482980.295:318): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:40.295000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:40.298000 audit[6938]: NETFILTER_CFG table=nat:123 family=2 entries=60 op=nft_register_rule pid=6938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:40.545986 kernel: audit: type=1325 audit(1707482980.298:319): table=nat:123 family=2 entries=60 op=nft_register_rule pid=6938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:40.546013 kernel: audit: type=1300 audit(1707482980.298:319): arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffcaad34c20 a2=0 a3=7ffcaad34c0c items=0 ppid=2992 pid=6938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:40.298000 audit[6938]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffcaad34c20 a2=0 a3=7ffcaad34c0c items=0 ppid=2992 pid=6938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:40.634457 kernel: audit: type=1327 audit(1707482980.298:319): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:40.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:40.458000 audit[6965]: NETFILTER_CFG table=filter:124 family=2 entries=6 op=nft_register_rule pid=6965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:40.458000 audit[6965]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc1841dae0 a2=0 a3=7ffc1841dacc items=0 ppid=2992 pid=6965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:40.458000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:40.750397 kernel: audit: type=1325 audit(1707482980.458:320): table=filter:124 family=2 entries=6 op=nft_register_rule pid=6965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:40.749000 audit[6965]: NETFILTER_CFG table=nat:125 family=2 entries=72 op=nft_register_chain pid=6965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:40.749000 audit[6965]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc1841dae0 a2=0 a3=7ffc1841dacc items=0 ppid=2992 pid=6965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:40.749000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:40.996829 systemd-networkd[1410]: cali959b849153d: Gained IPv6LL Feb 9 12:49:44.115349 env[1555]: time="2024-02-09T12:49:44.115323354Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:49:44.115991 env[1555]: time="2024-02-09T12:49:44.115979044Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:49:44.117349 env[1555]: time="2024-02-09T12:49:44.117336892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:49:44.118256 env[1555]: time="2024-02-09T12:49:44.118215760Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:49:44.119152 env[1555]: time="2024-02-09T12:49:44.119137290Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 12:49:44.119605 env[1555]: time="2024-02-09T12:49:44.119526956Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 12:49:44.123380 env[1555]: time="2024-02-09T12:49:44.123364544Z" level=info msg="CreateContainer within sandbox \"e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 12:49:44.151737 env[1555]: time="2024-02-09T12:49:44.151645653Z" level=info msg="CreateContainer within sandbox \"e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"858430d05fc4c7993d64e2a7bd12492e3daf3b5d7eeb293ef2f450ee68aa0159\"" Feb 9 12:49:44.152596 env[1555]: time="2024-02-09T12:49:44.152512388Z" level=info msg="StartContainer for \"858430d05fc4c7993d64e2a7bd12492e3daf3b5d7eeb293ef2f450ee68aa0159\"" Feb 9 12:49:44.214065 env[1555]: time="2024-02-09T12:49:44.214033962Z" level=info msg="StartContainer for \"858430d05fc4c7993d64e2a7bd12492e3daf3b5d7eeb293ef2f450ee68aa0159\" returns successfully" Feb 9 12:49:44.242974 kubelet[2728]: I0209 12:49:44.242954 2728 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7cb69b6b86-5vkkn" podStartSLOduration=-9.223371785611847e+09 pod.CreationTimestamp="2024-02-09 12:45:33 +0000 UTC" firstStartedPulling="2024-02-09 12:49:33.761314873 +0000 UTC m=+260.479791679" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 12:49:44.242503586 +0000 UTC m=+270.960980399" watchObservedRunningTime="2024-02-09 12:49:44.242927987 +0000 UTC m=+270.961404795" Feb 9 12:49:48.402806 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2165464539.mount: Deactivated successfully. Feb 9 12:49:57.757382 kubelet[2728]: I0209 12:49:57.757355 2728 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:49:57.760483 kubelet[2728]: I0209 12:49:57.760464 2728 topology_manager.go:210] "Topology Admit Handler" Feb 9 12:49:57.771000 audit[7129]: NETFILTER_CFG table=filter:126 family=2 entries=7 op=nft_register_rule pid=7129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:57.796964 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 9 12:49:57.797042 kernel: audit: type=1325 audit(1707482997.771:322): table=filter:126 family=2 entries=7 op=nft_register_rule pid=7129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:57.771000 audit[7129]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff2da54730 a2=0 a3=7fff2da5471c items=0 ppid=2992 pid=7129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:57.920913 kubelet[2728]: I0209 12:49:57.920897 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dhjhk\" (UniqueName: \"kubernetes.io/projected/802c282b-c5f0-43cc-91cd-e57eb8710a1e-kube-api-access-dhjhk\") pod \"calico-apiserver-67bb8dc999-rpldp\" (UID: \"802c282b-c5f0-43cc-91cd-e57eb8710a1e\") " pod="calico-apiserver/calico-apiserver-67bb8dc999-rpldp" Feb 9 12:49:57.920990 kubelet[2728]: I0209 12:49:57.920925 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/6ba6927a-1d06-4a83-88ef-af3ee5a80fcf-calico-apiserver-certs\") pod \"calico-apiserver-67bb8dc999-z7rkr\" (UID: \"6ba6927a-1d06-4a83-88ef-af3ee5a80fcf\") " pod="calico-apiserver/calico-apiserver-67bb8dc999-z7rkr" Feb 9 12:49:57.920990 kubelet[2728]: I0209 12:49:57.920939 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-whtgm\" (UniqueName: \"kubernetes.io/projected/6ba6927a-1d06-4a83-88ef-af3ee5a80fcf-kube-api-access-whtgm\") pod \"calico-apiserver-67bb8dc999-z7rkr\" (UID: \"6ba6927a-1d06-4a83-88ef-af3ee5a80fcf\") " pod="calico-apiserver/calico-apiserver-67bb8dc999-z7rkr" Feb 9 12:49:57.921036 kubelet[2728]: I0209 12:49:57.920998 2728 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/802c282b-c5f0-43cc-91cd-e57eb8710a1e-calico-apiserver-certs\") pod \"calico-apiserver-67bb8dc999-rpldp\" (UID: \"802c282b-c5f0-43cc-91cd-e57eb8710a1e\") " pod="calico-apiserver/calico-apiserver-67bb8dc999-rpldp" Feb 9 12:49:57.940174 kernel: audit: type=1300 audit(1707482997.771:322): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff2da54730 a2=0 a3=7fff2da5471c items=0 ppid=2992 pid=7129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:57.940209 kernel: audit: type=1327 audit(1707482997.771:322): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:57.771000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:57.772000 audit[7129]: NETFILTER_CFG table=nat:127 family=2 entries=78 op=nft_register_rule pid=7129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:57.772000 audit[7129]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff2da54730 a2=0 a3=7fff2da5471c items=0 ppid=2992 pid=7129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:58.060144 env[1555]: time="2024-02-09T12:49:58.060094480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67bb8dc999-z7rkr,Uid:6ba6927a-1d06-4a83-88ef-af3ee5a80fcf,Namespace:calico-apiserver,Attempt:0,}" Feb 9 12:49:58.063396 env[1555]: time="2024-02-09T12:49:58.063378754Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67bb8dc999-rpldp,Uid:802c282b-c5f0-43cc-91cd-e57eb8710a1e,Namespace:calico-apiserver,Attempt:0,}" Feb 9 12:49:58.147478 kernel: audit: type=1325 audit(1707482997.772:323): table=nat:127 family=2 entries=78 op=nft_register_rule pid=7129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:58.147558 kernel: audit: type=1300 audit(1707482997.772:323): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff2da54730 a2=0 a3=7fff2da5471c items=0 ppid=2992 pid=7129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:58.147578 kernel: audit: type=1327 audit(1707482997.772:323): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:57.772000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:58.162617 systemd-networkd[1410]: cali2a79588367d: Link UP Feb 9 12:49:58.201423 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 12:49:58.019000 audit[7156]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=7156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:58.282220 kernel: audit: type=1325 audit(1707482998.019:324): table=filter:128 family=2 entries=8 op=nft_register_rule pid=7156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:58.282291 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2a79588367d: link becomes ready Feb 9 12:49:58.282311 kernel: audit: type=1300 audit(1707482998.019:324): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffeb914d370 a2=0 a3=7ffeb914d35c items=0 ppid=2992 pid=7156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:58.019000 audit[7156]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffeb914d370 a2=0 a3=7ffeb914d35c items=0 ppid=2992 pid=7156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:58.309497 systemd-networkd[1410]: cali2a79588367d: Gained carrier Feb 9 12:49:58.310192 systemd-networkd[1410]: calibc55be9dbb6: Link UP Feb 9 12:49:58.019000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:58.404459 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibc55be9dbb6: link becomes ready Feb 9 12:49:58.404495 kernel: audit: type=1327 audit(1707482998.019:324): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:58.490387 systemd-networkd[1410]: calibc55be9dbb6: Gained carrier Feb 9 12:49:58.494000 audit[7156]: NETFILTER_CFG table=nat:129 family=2 entries=78 op=nft_register_rule pid=7156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.082 [INFO][7172] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-eth0 calico-apiserver-67bb8dc999- calico-apiserver 802c282b-c5f0-43cc-91cd-e57eb8710a1e 1273 0 2024-02-09 12:49:57 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:67bb8dc999 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-524ff09451 calico-apiserver-67bb8dc999-rpldp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibc55be9dbb6 [] []}} ContainerID="74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-rpldp" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-" Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.082 [INFO][7172] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-rpldp" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-eth0" Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.095 [INFO][7213] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" HandleID="k8s-pod-network.74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-eth0" Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.101 [INFO][7213] ipam_plugin.go 268: Auto assigning IP ContainerID="74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" HandleID="k8s-pod-network.74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b53b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-524ff09451", "pod":"calico-apiserver-67bb8dc999-rpldp", "timestamp":"2024-02-09 12:49:58.095556318 +0000 UTC"}, Hostname:"ci-3510.3.2-a-524ff09451", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.101 [INFO][7213] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.160 [INFO][7213] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.161 [INFO][7213] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-524ff09451' Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.162 [INFO][7213] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.203 [INFO][7213] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.206 [INFO][7213] ipam.go 489: Trying affinity for 192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.207 [INFO][7213] ipam.go 155: Attempting to load block cidr=192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.208 [INFO][7213] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.208 [INFO][7213] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.192/26 handle="k8s-pod-network.74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.209 [INFO][7213] ipam.go 1682: Creating new handle: k8s-pod-network.74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04 Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.213 [INFO][7213] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.192/26 handle="k8s-pod-network.74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.216 [INFO][7213] ipam.go 1216: Successfully claimed IPs: [192.168.90.198/26] block=192.168.90.192/26 handle="k8s-pod-network.74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.216 [INFO][7213] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.198/26] handle="k8s-pod-network.74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.216 [INFO][7213] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:49:58.500837 env[1555]: 2024-02-09 12:49:58.216 [INFO][7213] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.198/26] IPv6=[] ContainerID="74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" HandleID="k8s-pod-network.74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-eth0" Feb 9 12:49:58.501379 env[1555]: 2024-02-09 12:49:58.217 [INFO][7172] k8s.go 385: Populated endpoint ContainerID="74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-rpldp" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-eth0", GenerateName:"calico-apiserver-67bb8dc999-", Namespace:"calico-apiserver", SelfLink:"", UID:"802c282b-c5f0-43cc-91cd-e57eb8710a1e", ResourceVersion:"1273", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 49, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67bb8dc999", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"", Pod:"calico-apiserver-67bb8dc999-rpldp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.90.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibc55be9dbb6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:49:58.501379 env[1555]: 2024-02-09 12:49:58.217 [INFO][7172] k8s.go 386: Calico CNI using IPs: [192.168.90.198/32] ContainerID="74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-rpldp" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-eth0" Feb 9 12:49:58.501379 env[1555]: 2024-02-09 12:49:58.217 [INFO][7172] dataplane_linux.go 68: Setting the host side veth name to calibc55be9dbb6 ContainerID="74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-rpldp" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-eth0" Feb 9 12:49:58.501379 env[1555]: 2024-02-09 12:49:58.490 [INFO][7172] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-rpldp" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-eth0" Feb 9 12:49:58.501379 env[1555]: 2024-02-09 12:49:58.495 [INFO][7172] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-rpldp" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-eth0", GenerateName:"calico-apiserver-67bb8dc999-", Namespace:"calico-apiserver", SelfLink:"", UID:"802c282b-c5f0-43cc-91cd-e57eb8710a1e", ResourceVersion:"1273", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 49, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67bb8dc999", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04", Pod:"calico-apiserver-67bb8dc999-rpldp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.90.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibc55be9dbb6", MAC:"66:35:0c:42:58:23", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:49:58.501379 env[1555]: 2024-02-09 12:49:58.499 [INFO][7172] k8s.go 491: Wrote updated endpoint to datastore ContainerID="74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-rpldp" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--rpldp-eth0" Feb 9 12:49:58.501379 env[1555]: 2024-02-09 12:49:58.081 [INFO][7162] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-eth0 calico-apiserver-67bb8dc999- calico-apiserver 6ba6927a-1d06-4a83-88ef-af3ee5a80fcf 1271 0 2024-02-09 12:49:57 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:67bb8dc999 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-524ff09451 calico-apiserver-67bb8dc999-z7rkr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2a79588367d [] []}} ContainerID="6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-z7rkr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-" Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.081 [INFO][7162] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-z7rkr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-eth0" Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.094 [INFO][7208] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" HandleID="k8s-pod-network.6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-eth0" Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.100 [INFO][7208] ipam_plugin.go 268: Auto assigning IP ContainerID="6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" HandleID="k8s-pod-network.6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051900), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-524ff09451", "pod":"calico-apiserver-67bb8dc999-z7rkr", "timestamp":"2024-02-09 12:49:58.094282231 +0000 UTC"}, Hostname:"ci-3510.3.2-a-524ff09451", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.100 [INFO][7208] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.100 [INFO][7208] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.100 [INFO][7208] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-524ff09451' Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.101 [INFO][7208] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.149 [INFO][7208] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.152 [INFO][7208] ipam.go 489: Trying affinity for 192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.153 [INFO][7208] ipam.go 155: Attempting to load block cidr=192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.155 [INFO][7208] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.192/26 host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.155 [INFO][7208] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.192/26 handle="k8s-pod-network.6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.156 [INFO][7208] ipam.go 1682: Creating new handle: k8s-pod-network.6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92 Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.158 [INFO][7208] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.192/26 handle="k8s-pod-network.6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.160 [INFO][7208] ipam.go 1216: Successfully claimed IPs: [192.168.90.197/26] block=192.168.90.192/26 handle="k8s-pod-network.6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.160 [INFO][7208] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.197/26] handle="k8s-pod-network.6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" host="ci-3510.3.2-a-524ff09451" Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.160 [INFO][7208] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.160 [INFO][7208] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.197/26] IPv6=[] ContainerID="6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" HandleID="k8s-pod-network.6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-eth0" Feb 9 12:49:58.501631 env[1555]: 2024-02-09 12:49:58.161 [INFO][7162] k8s.go 385: Populated endpoint ContainerID="6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-z7rkr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-eth0", GenerateName:"calico-apiserver-67bb8dc999-", Namespace:"calico-apiserver", SelfLink:"", UID:"6ba6927a-1d06-4a83-88ef-af3ee5a80fcf", ResourceVersion:"1271", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 49, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67bb8dc999", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"", Pod:"calico-apiserver-67bb8dc999-z7rkr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.90.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2a79588367d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:49:58.502087 env[1555]: 2024-02-09 12:49:58.161 [INFO][7162] k8s.go 386: Calico CNI using IPs: [192.168.90.197/32] ContainerID="6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-z7rkr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-eth0" Feb 9 12:49:58.502087 env[1555]: 2024-02-09 12:49:58.161 [INFO][7162] dataplane_linux.go 68: Setting the host side veth name to cali2a79588367d ContainerID="6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-z7rkr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-eth0" Feb 9 12:49:58.502087 env[1555]: 2024-02-09 12:49:58.162 [INFO][7162] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-z7rkr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-eth0" Feb 9 12:49:58.502087 env[1555]: 2024-02-09 12:49:58.495 [INFO][7162] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-z7rkr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-eth0", GenerateName:"calico-apiserver-67bb8dc999-", Namespace:"calico-apiserver", SelfLink:"", UID:"6ba6927a-1d06-4a83-88ef-af3ee5a80fcf", ResourceVersion:"1271", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 49, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67bb8dc999", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92", Pod:"calico-apiserver-67bb8dc999-z7rkr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.90.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2a79588367d", MAC:"42:03:05:1c:5c:1a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:49:58.502087 env[1555]: 2024-02-09 12:49:58.500 [INFO][7162] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92" Namespace="calico-apiserver" Pod="calico-apiserver-67bb8dc999-z7rkr" WorkloadEndpoint="ci--3510.3.2--a--524ff09451-k8s-calico--apiserver--67bb8dc999--z7rkr-eth0" Feb 9 12:49:58.506873 env[1555]: time="2024-02-09T12:49:58.506838711Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:49:58.506873 env[1555]: time="2024-02-09T12:49:58.506861032Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:49:58.506873 env[1555]: time="2024-02-09T12:49:58.506867897Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:49:58.507009 env[1555]: time="2024-02-09T12:49:58.506932583Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92 pid=7285 runtime=io.containerd.runc.v2 Feb 9 12:49:58.507323 env[1555]: time="2024-02-09T12:49:58.507294899Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:49:58.507364 env[1555]: time="2024-02-09T12:49:58.507318443Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:49:58.507364 env[1555]: time="2024-02-09T12:49:58.507330203Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:49:58.507429 env[1555]: time="2024-02-09T12:49:58.507410413Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04 pid=7293 runtime=io.containerd.runc.v2 Feb 9 12:49:58.494000 audit[7156]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffeb914d370 a2=0 a3=7ffeb914d35c items=0 ppid=2992 pid=7156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:58.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:49:58.555446 kernel: audit: type=1325 audit(1707482998.494:325): table=nat:129 family=2 entries=78 op=nft_register_rule pid=7156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:49:58.568000 audit[7341]: NETFILTER_CFG table=filter:130 family=2 entries=91 op=nft_register_chain pid=7341 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 12:49:58.568000 audit[7341]: SYSCALL arch=c000003e syscall=46 success=yes exit=48956 a0=3 a1=7ffff05ac6c0 a2=0 a3=7ffff05ac6ac items=0 ppid=6091 pid=7341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:49:58.568000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 12:49:58.579720 env[1555]: time="2024-02-09T12:49:58.579696441Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67bb8dc999-rpldp,Uid:802c282b-c5f0-43cc-91cd-e57eb8710a1e,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04\"" Feb 9 12:49:58.590977 env[1555]: time="2024-02-09T12:49:58.590938586Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67bb8dc999-z7rkr,Uid:6ba6927a-1d06-4a83-88ef-af3ee5a80fcf,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92\"" Feb 9 12:49:59.619717 systemd-networkd[1410]: cali2a79588367d: Gained IPv6LL Feb 9 12:49:59.747688 systemd-networkd[1410]: calibc55be9dbb6: Gained IPv6LL Feb 9 12:50:13.450326 env[1555]: time="2024-02-09T12:50:13.450305957Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:50:13.490430 env[1555]: 2024-02-09 12:50:13.471 [WARNING][7387] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"ca9ba966-733c-4c50-9cea-076af2df5ddd", ResourceVersion:"1180", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164", Pod:"coredns-787d4945fb-l6lth", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali959b849153d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:50:13.490430 env[1555]: 2024-02-09 12:50:13.471 [INFO][7387] k8s.go 578: Cleaning up netns ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:50:13.490430 env[1555]: 2024-02-09 12:50:13.471 [INFO][7387] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" iface="eth0" netns="" Feb 9 12:50:13.490430 env[1555]: 2024-02-09 12:50:13.471 [INFO][7387] k8s.go 585: Releasing IP address(es) ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:50:13.490430 env[1555]: 2024-02-09 12:50:13.471 [INFO][7387] utils.go 188: Calico CNI releasing IP address ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:50:13.490430 env[1555]: 2024-02-09 12:50:13.482 [INFO][7405] ipam_plugin.go 415: Releasing address using handleID ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" HandleID="k8s-pod-network.d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:50:13.490430 env[1555]: 2024-02-09 12:50:13.482 [INFO][7405] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:50:13.490430 env[1555]: 2024-02-09 12:50:13.482 [INFO][7405] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:50:13.490430 env[1555]: 2024-02-09 12:50:13.487 [WARNING][7405] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" HandleID="k8s-pod-network.d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:50:13.490430 env[1555]: 2024-02-09 12:50:13.487 [INFO][7405] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" HandleID="k8s-pod-network.d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:50:13.490430 env[1555]: 2024-02-09 12:50:13.488 [INFO][7405] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:50:13.490430 env[1555]: 2024-02-09 12:50:13.489 [INFO][7387] k8s.go 591: Teardown processing complete. ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:50:13.490840 env[1555]: time="2024-02-09T12:50:13.490446754Z" level=info msg="TearDown network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" successfully" Feb 9 12:50:13.490840 env[1555]: time="2024-02-09T12:50:13.490469103Z" level=info msg="StopPodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" returns successfully" Feb 9 12:50:13.490840 env[1555]: time="2024-02-09T12:50:13.490800411Z" level=info msg="RemovePodSandbox for \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:50:13.490914 env[1555]: time="2024-02-09T12:50:13.490823741Z" level=info msg="Forcibly stopping sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\"" Feb 9 12:50:13.533255 env[1555]: 2024-02-09 12:50:13.514 [WARNING][7433] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"ca9ba966-733c-4c50-9cea-076af2df5ddd", ResourceVersion:"1180", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"73fb0046e56bd599a81511476c633052bf5a97e569876198928ee4105c64e164", Pod:"coredns-787d4945fb-l6lth", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali959b849153d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:50:13.533255 env[1555]: 2024-02-09 12:50:13.514 [INFO][7433] k8s.go 578: Cleaning up netns ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:50:13.533255 env[1555]: 2024-02-09 12:50:13.514 [INFO][7433] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" iface="eth0" netns="" Feb 9 12:50:13.533255 env[1555]: 2024-02-09 12:50:13.514 [INFO][7433] k8s.go 585: Releasing IP address(es) ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:50:13.533255 env[1555]: 2024-02-09 12:50:13.514 [INFO][7433] utils.go 188: Calico CNI releasing IP address ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:50:13.533255 env[1555]: 2024-02-09 12:50:13.525 [INFO][7450] ipam_plugin.go 415: Releasing address using handleID ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" HandleID="k8s-pod-network.d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:50:13.533255 env[1555]: 2024-02-09 12:50:13.525 [INFO][7450] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:50:13.533255 env[1555]: 2024-02-09 12:50:13.526 [INFO][7450] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:50:13.533255 env[1555]: 2024-02-09 12:50:13.530 [WARNING][7450] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" HandleID="k8s-pod-network.d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:50:13.533255 env[1555]: 2024-02-09 12:50:13.530 [INFO][7450] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" HandleID="k8s-pod-network.d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--l6lth-eth0" Feb 9 12:50:13.533255 env[1555]: 2024-02-09 12:50:13.531 [INFO][7450] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:50:13.533255 env[1555]: 2024-02-09 12:50:13.532 [INFO][7433] k8s.go 591: Teardown processing complete. ContainerID="d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1" Feb 9 12:50:13.533683 env[1555]: time="2024-02-09T12:50:13.533272587Z" level=info msg="TearDown network for sandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" successfully" Feb 9 12:50:13.534751 env[1555]: time="2024-02-09T12:50:13.534736492Z" level=info msg="RemovePodSandbox \"d7f776b4120a615abb97afa6d0ce3269c5df102e0ffc72b1b477839068a657a1\" returns successfully" Feb 9 12:50:13.535089 env[1555]: time="2024-02-09T12:50:13.535071731Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:50:13.580706 env[1555]: 2024-02-09 12:50:13.557 [WARNING][7479] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0", GenerateName:"calico-kube-controllers-7cb69b6b86-", Namespace:"calico-system", SelfLink:"", UID:"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7cb69b6b86", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d", Pod:"calico-kube-controllers-7cb69b6b86-5vkkn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.90.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0136f19d70a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:50:13.580706 env[1555]: 2024-02-09 12:50:13.557 [INFO][7479] k8s.go 578: Cleaning up netns ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:50:13.580706 env[1555]: 2024-02-09 12:50:13.557 [INFO][7479] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" iface="eth0" netns="" Feb 9 12:50:13.580706 env[1555]: 2024-02-09 12:50:13.557 [INFO][7479] k8s.go 585: Releasing IP address(es) ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:50:13.580706 env[1555]: 2024-02-09 12:50:13.558 [INFO][7479] utils.go 188: Calico CNI releasing IP address ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:50:13.580706 env[1555]: 2024-02-09 12:50:13.571 [INFO][7495] ipam_plugin.go 415: Releasing address using handleID ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" HandleID="k8s-pod-network.f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:50:13.580706 env[1555]: 2024-02-09 12:50:13.571 [INFO][7495] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:50:13.580706 env[1555]: 2024-02-09 12:50:13.571 [INFO][7495] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:50:13.580706 env[1555]: 2024-02-09 12:50:13.577 [WARNING][7495] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" HandleID="k8s-pod-network.f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:50:13.580706 env[1555]: 2024-02-09 12:50:13.577 [INFO][7495] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" HandleID="k8s-pod-network.f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:50:13.580706 env[1555]: 2024-02-09 12:50:13.578 [INFO][7495] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:50:13.580706 env[1555]: 2024-02-09 12:50:13.579 [INFO][7479] k8s.go 591: Teardown processing complete. ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:50:13.581219 env[1555]: time="2024-02-09T12:50:13.580703627Z" level=info msg="TearDown network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" successfully" Feb 9 12:50:13.581219 env[1555]: time="2024-02-09T12:50:13.580728575Z" level=info msg="StopPodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" returns successfully" Feb 9 12:50:13.581219 env[1555]: time="2024-02-09T12:50:13.581025515Z" level=info msg="RemovePodSandbox for \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:50:13.581219 env[1555]: time="2024-02-09T12:50:13.581059086Z" level=info msg="Forcibly stopping sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\"" Feb 9 12:50:13.649812 env[1555]: 2024-02-09 12:50:13.615 [WARNING][7529] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0", GenerateName:"calico-kube-controllers-7cb69b6b86-", Namespace:"calico-system", SelfLink:"", UID:"a361b76f-ced1-4e9c-8f8c-27ce35bfca6f", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7cb69b6b86", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"e98c04c13e1e93c61998433ecc1a190a33be7b7d3e60e25935bf3d75f45c2d3d", Pod:"calico-kube-controllers-7cb69b6b86-5vkkn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.90.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0136f19d70a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:50:13.649812 env[1555]: 2024-02-09 12:50:13.616 [INFO][7529] k8s.go 578: Cleaning up netns ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:50:13.649812 env[1555]: 2024-02-09 12:50:13.616 [INFO][7529] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" iface="eth0" netns="" Feb 9 12:50:13.649812 env[1555]: 2024-02-09 12:50:13.616 [INFO][7529] k8s.go 585: Releasing IP address(es) ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:50:13.649812 env[1555]: 2024-02-09 12:50:13.616 [INFO][7529] utils.go 188: Calico CNI releasing IP address ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:50:13.649812 env[1555]: 2024-02-09 12:50:13.637 [INFO][7544] ipam_plugin.go 415: Releasing address using handleID ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" HandleID="k8s-pod-network.f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:50:13.649812 env[1555]: 2024-02-09 12:50:13.637 [INFO][7544] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:50:13.649812 env[1555]: 2024-02-09 12:50:13.638 [INFO][7544] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:50:13.649812 env[1555]: 2024-02-09 12:50:13.645 [WARNING][7544] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" HandleID="k8s-pod-network.f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:50:13.649812 env[1555]: 2024-02-09 12:50:13.645 [INFO][7544] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" HandleID="k8s-pod-network.f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Workload="ci--3510.3.2--a--524ff09451-k8s-calico--kube--controllers--7cb69b6b86--5vkkn-eth0" Feb 9 12:50:13.649812 env[1555]: 2024-02-09 12:50:13.647 [INFO][7544] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:50:13.649812 env[1555]: 2024-02-09 12:50:13.648 [INFO][7529] k8s.go 591: Teardown processing complete. ContainerID="f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a" Feb 9 12:50:13.650469 env[1555]: time="2024-02-09T12:50:13.649816503Z" level=info msg="TearDown network for sandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" successfully" Feb 9 12:50:13.652222 env[1555]: time="2024-02-09T12:50:13.652192576Z" level=info msg="RemovePodSandbox \"f33961606b1757a0b05076c831298517ac470c8029cb6cf52612ec932161926a\" returns successfully" Feb 9 12:50:13.652689 env[1555]: time="2024-02-09T12:50:13.652659336Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:50:13.758710 env[1555]: 2024-02-09 12:50:13.711 [WARNING][7575] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3d7559de-a11a-443c-bbd2-21f3384d343f", ResourceVersion:"1158", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2", Pod:"csi-node-driver-2lnwr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.90.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5da492533d9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:50:13.758710 env[1555]: 2024-02-09 12:50:13.711 [INFO][7575] k8s.go 578: Cleaning up netns ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:50:13.758710 env[1555]: 2024-02-09 12:50:13.711 [INFO][7575] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" iface="eth0" netns="" Feb 9 12:50:13.758710 env[1555]: 2024-02-09 12:50:13.711 [INFO][7575] k8s.go 585: Releasing IP address(es) ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:50:13.758710 env[1555]: 2024-02-09 12:50:13.711 [INFO][7575] utils.go 188: Calico CNI releasing IP address ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:50:13.758710 env[1555]: 2024-02-09 12:50:13.748 [INFO][7593] ipam_plugin.go 415: Releasing address using handleID ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" HandleID="k8s-pod-network.a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Workload="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:50:13.758710 env[1555]: 2024-02-09 12:50:13.748 [INFO][7593] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:50:13.758710 env[1555]: 2024-02-09 12:50:13.748 [INFO][7593] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:50:13.758710 env[1555]: 2024-02-09 12:50:13.755 [WARNING][7593] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" HandleID="k8s-pod-network.a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Workload="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:50:13.758710 env[1555]: 2024-02-09 12:50:13.755 [INFO][7593] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" HandleID="k8s-pod-network.a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Workload="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:50:13.758710 env[1555]: 2024-02-09 12:50:13.756 [INFO][7593] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:50:13.758710 env[1555]: 2024-02-09 12:50:13.757 [INFO][7575] k8s.go 591: Teardown processing complete. ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:50:13.758710 env[1555]: time="2024-02-09T12:50:13.758685819Z" level=info msg="TearDown network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" successfully" Feb 9 12:50:13.759215 env[1555]: time="2024-02-09T12:50:13.758712688Z" level=info msg="StopPodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" returns successfully" Feb 9 12:50:13.759215 env[1555]: time="2024-02-09T12:50:13.759084194Z" level=info msg="RemovePodSandbox for \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:50:13.759215 env[1555]: time="2024-02-09T12:50:13.759119084Z" level=info msg="Forcibly stopping sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\"" Feb 9 12:50:13.798475 env[1555]: 2024-02-09 12:50:13.781 [WARNING][7624] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3d7559de-a11a-443c-bbd2-21f3384d343f", ResourceVersion:"1158", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2", Pod:"csi-node-driver-2lnwr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.90.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5da492533d9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:50:13.798475 env[1555]: 2024-02-09 12:50:13.781 [INFO][7624] k8s.go 578: Cleaning up netns ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:50:13.798475 env[1555]: 2024-02-09 12:50:13.781 [INFO][7624] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" iface="eth0" netns="" Feb 9 12:50:13.798475 env[1555]: 2024-02-09 12:50:13.781 [INFO][7624] k8s.go 585: Releasing IP address(es) ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:50:13.798475 env[1555]: 2024-02-09 12:50:13.781 [INFO][7624] utils.go 188: Calico CNI releasing IP address ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:50:13.798475 env[1555]: 2024-02-09 12:50:13.791 [INFO][7641] ipam_plugin.go 415: Releasing address using handleID ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" HandleID="k8s-pod-network.a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Workload="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:50:13.798475 env[1555]: 2024-02-09 12:50:13.791 [INFO][7641] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:50:13.798475 env[1555]: 2024-02-09 12:50:13.791 [INFO][7641] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:50:13.798475 env[1555]: 2024-02-09 12:50:13.796 [WARNING][7641] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" HandleID="k8s-pod-network.a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Workload="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:50:13.798475 env[1555]: 2024-02-09 12:50:13.796 [INFO][7641] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" HandleID="k8s-pod-network.a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Workload="ci--3510.3.2--a--524ff09451-k8s-csi--node--driver--2lnwr-eth0" Feb 9 12:50:13.798475 env[1555]: 2024-02-09 12:50:13.797 [INFO][7641] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:50:13.798475 env[1555]: 2024-02-09 12:50:13.797 [INFO][7624] k8s.go 591: Teardown processing complete. ContainerID="a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332" Feb 9 12:50:13.798793 env[1555]: time="2024-02-09T12:50:13.798477397Z" level=info msg="TearDown network for sandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" successfully" Feb 9 12:50:13.799788 env[1555]: time="2024-02-09T12:50:13.799777031Z" level=info msg="RemovePodSandbox \"a462030803d89375bf33ebcdc759886c7feef5a8ae59f7f699154d8bfacdf332\" returns successfully" Feb 9 12:50:13.800054 env[1555]: time="2024-02-09T12:50:13.800041550Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:50:13.835116 env[1555]: 2024-02-09 12:50:13.817 [WARNING][7670] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"c1cd8082-cdbc-42e8-af70-b207780880fb", ResourceVersion:"1139", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7", Pod:"coredns-787d4945fb-r6ph9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali20d5343214f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:50:13.835116 env[1555]: 2024-02-09 12:50:13.817 [INFO][7670] k8s.go 578: Cleaning up netns ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:50:13.835116 env[1555]: 2024-02-09 12:50:13.817 [INFO][7670] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" iface="eth0" netns="" Feb 9 12:50:13.835116 env[1555]: 2024-02-09 12:50:13.817 [INFO][7670] k8s.go 585: Releasing IP address(es) ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:50:13.835116 env[1555]: 2024-02-09 12:50:13.817 [INFO][7670] utils.go 188: Calico CNI releasing IP address ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:50:13.835116 env[1555]: 2024-02-09 12:50:13.827 [INFO][7683] ipam_plugin.go 415: Releasing address using handleID ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" HandleID="k8s-pod-network.c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:50:13.835116 env[1555]: 2024-02-09 12:50:13.828 [INFO][7683] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:50:13.835116 env[1555]: 2024-02-09 12:50:13.828 [INFO][7683] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:50:13.835116 env[1555]: 2024-02-09 12:50:13.832 [WARNING][7683] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" HandleID="k8s-pod-network.c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:50:13.835116 env[1555]: 2024-02-09 12:50:13.832 [INFO][7683] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" HandleID="k8s-pod-network.c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:50:13.835116 env[1555]: 2024-02-09 12:50:13.833 [INFO][7683] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:50:13.835116 env[1555]: 2024-02-09 12:50:13.834 [INFO][7670] k8s.go 591: Teardown processing complete. ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:50:13.835116 env[1555]: time="2024-02-09T12:50:13.835105962Z" level=info msg="TearDown network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" successfully" Feb 9 12:50:13.835554 env[1555]: time="2024-02-09T12:50:13.835127053Z" level=info msg="StopPodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" returns successfully" Feb 9 12:50:13.835554 env[1555]: time="2024-02-09T12:50:13.835382457Z" level=info msg="RemovePodSandbox for \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:50:13.835554 env[1555]: time="2024-02-09T12:50:13.835417050Z" level=info msg="Forcibly stopping sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\"" Feb 9 12:50:13.884451 env[1555]: 2024-02-09 12:50:13.859 [WARNING][7712] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"c1cd8082-cdbc-42e8-af70-b207780880fb", ResourceVersion:"1139", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 45, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-524ff09451", ContainerID:"0b3b447b675350151f4c1dbdf45bc7fb814c1cd810de41c20455499530a442d7", Pod:"coredns-787d4945fb-r6ph9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali20d5343214f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:50:13.884451 env[1555]: 2024-02-09 12:50:13.860 [INFO][7712] k8s.go 578: Cleaning up netns ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:50:13.884451 env[1555]: 2024-02-09 12:50:13.860 [INFO][7712] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" iface="eth0" netns="" Feb 9 12:50:13.884451 env[1555]: 2024-02-09 12:50:13.860 [INFO][7712] k8s.go 585: Releasing IP address(es) ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:50:13.884451 env[1555]: 2024-02-09 12:50:13.860 [INFO][7712] utils.go 188: Calico CNI releasing IP address ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:50:13.884451 env[1555]: 2024-02-09 12:50:13.874 [INFO][7730] ipam_plugin.go 415: Releasing address using handleID ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" HandleID="k8s-pod-network.c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:50:13.884451 env[1555]: 2024-02-09 12:50:13.874 [INFO][7730] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:50:13.884451 env[1555]: 2024-02-09 12:50:13.874 [INFO][7730] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:50:13.884451 env[1555]: 2024-02-09 12:50:13.881 [WARNING][7730] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" HandleID="k8s-pod-network.c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:50:13.884451 env[1555]: 2024-02-09 12:50:13.881 [INFO][7730] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" HandleID="k8s-pod-network.c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Workload="ci--3510.3.2--a--524ff09451-k8s-coredns--787d4945fb--r6ph9-eth0" Feb 9 12:50:13.884451 env[1555]: 2024-02-09 12:50:13.882 [INFO][7730] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:50:13.884451 env[1555]: 2024-02-09 12:50:13.883 [INFO][7712] k8s.go 591: Teardown processing complete. ContainerID="c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f" Feb 9 12:50:13.884941 env[1555]: time="2024-02-09T12:50:13.884474205Z" level=info msg="TearDown network for sandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" successfully" Feb 9 12:50:13.886249 env[1555]: time="2024-02-09T12:50:13.886230228Z" level=info msg="RemovePodSandbox \"c038ba73ec268325406236ce5aaf9720ad60f7b10db0dd1b9c36d20f2a6dab8f\" returns successfully" Feb 9 12:51:30.528962 systemd[1]: Started sshd@8-139.178.91.169:22-147.75.109.163:39612.service. Feb 9 12:51:30.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.91.169:22-147.75.109.163:39612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:30.555947 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 9 12:51:30.556017 kernel: audit: type=1130 audit(1707483090.528:327): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.91.169:22-147.75.109.163:39612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:30.665000 audit[7970]: USER_ACCT pid=7970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:30.665908 sshd[7970]: Accepted publickey for core from 147.75.109.163 port 39612 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:51:30.667633 sshd[7970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:51:30.670261 systemd-logind[1541]: New session 10 of user core. Feb 9 12:51:30.670662 systemd[1]: Started session-10.scope. Feb 9 12:51:30.667000 audit[7970]: CRED_ACQ pid=7970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:30.757404 kernel: audit: type=1101 audit(1707483090.665:328): pid=7970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:30.757441 kernel: audit: type=1103 audit(1707483090.667:329): pid=7970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:30.758535 sshd[7970]: pam_unix(sshd:session): session closed for user core Feb 9 12:51:30.759874 systemd[1]: sshd@8-139.178.91.169:22-147.75.109.163:39612.service: Deactivated successfully. Feb 9 12:51:30.760400 systemd-logind[1541]: Session 10 logged out. Waiting for processes to exit. Feb 9 12:51:30.760439 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 12:51:30.761005 systemd-logind[1541]: Removed session 10. Feb 9 12:51:30.904226 kernel: audit: type=1006 audit(1707483090.667:330): pid=7970 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 12:51:30.904262 kernel: audit: type=1300 audit(1707483090.667:330): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd21cb1c40 a2=3 a3=0 items=0 ppid=1 pid=7970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:51:30.667000 audit[7970]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd21cb1c40 a2=3 a3=0 items=0 ppid=1 pid=7970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:51:30.995222 kernel: audit: type=1327 audit(1707483090.667:330): proctitle=737368643A20636F7265205B707269765D Feb 9 12:51:30.667000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:51:31.025313 kernel: audit: type=1105 audit(1707483090.672:331): pid=7970 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:30.672000 audit[7970]: USER_START pid=7970 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:31.118814 kernel: audit: type=1103 audit(1707483090.672:332): pid=7973 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:30.672000 audit[7973]: CRED_ACQ pid=7973 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:31.206846 kernel: audit: type=1106 audit(1707483090.758:333): pid=7970 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:30.758000 audit[7970]: USER_END pid=7970 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:30.758000 audit[7970]: CRED_DISP pid=7970 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:31.389718 kernel: audit: type=1104 audit(1707483090.758:334): pid=7970 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:30.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.91.169:22-147.75.109.163:39612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:35.766388 systemd[1]: Started sshd@9-139.178.91.169:22-147.75.109.163:59756.service. Feb 9 12:51:35.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.91.169:22-147.75.109.163:59756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:35.793763 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:51:35.793818 kernel: audit: type=1130 audit(1707483095.766:336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.91.169:22-147.75.109.163:59756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:35.903000 audit[8007]: USER_ACCT pid=8007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:35.903540 sshd[8007]: Accepted publickey for core from 147.75.109.163 port 59756 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:51:35.904968 sshd[8007]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:51:35.907467 systemd-logind[1541]: New session 11 of user core. Feb 9 12:51:35.907958 systemd[1]: Started session-11.scope. Feb 9 12:51:35.904000 audit[8007]: CRED_ACQ pid=8007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:36.000090 sshd[8007]: pam_unix(sshd:session): session closed for user core Feb 9 12:51:36.001503 systemd[1]: sshd@9-139.178.91.169:22-147.75.109.163:59756.service: Deactivated successfully. Feb 9 12:51:36.002112 systemd-logind[1541]: Session 11 logged out. Waiting for processes to exit. Feb 9 12:51:36.002123 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 12:51:36.002584 systemd-logind[1541]: Removed session 11. Feb 9 12:51:36.083473 kernel: audit: type=1101 audit(1707483095.903:337): pid=8007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:36.083514 kernel: audit: type=1103 audit(1707483095.904:338): pid=8007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:36.083532 kernel: audit: type=1006 audit(1707483095.904:339): pid=8007 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 12:51:36.142059 kernel: audit: type=1300 audit(1707483095.904:339): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf2a1d760 a2=3 a3=0 items=0 ppid=1 pid=8007 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:51:35.904000 audit[8007]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf2a1d760 a2=3 a3=0 items=0 ppid=1 pid=8007 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:51:36.233921 kernel: audit: type=1327 audit(1707483095.904:339): proctitle=737368643A20636F7265205B707269765D Feb 9 12:51:35.904000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:51:36.264388 kernel: audit: type=1105 audit(1707483095.909:340): pid=8007 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:35.909000 audit[8007]: USER_START pid=8007 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:36.358831 kernel: audit: type=1103 audit(1707483095.909:341): pid=8010 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:35.909000 audit[8010]: CRED_ACQ pid=8010 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:36.447980 kernel: audit: type=1106 audit(1707483096.000:342): pid=8007 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:36.000000 audit[8007]: USER_END pid=8007 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:36.543429 kernel: audit: type=1104 audit(1707483096.000:343): pid=8007 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:36.000000 audit[8007]: CRED_DISP pid=8007 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:36.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.91.169:22-147.75.109.163:59756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:41.002953 systemd[1]: Started sshd@10-139.178.91.169:22-147.75.109.163:59768.service. Feb 9 12:51:41.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.91.169:22-147.75.109.163:59768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:41.029988 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:51:41.030056 kernel: audit: type=1130 audit(1707483101.002:345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.91.169:22-147.75.109.163:59768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:41.140000 audit[8037]: USER_ACCT pid=8037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:41.140875 sshd[8037]: Accepted publickey for core from 147.75.109.163 port 59768 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:51:41.142322 sshd[8037]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:51:41.144885 systemd-logind[1541]: New session 12 of user core. Feb 9 12:51:41.145297 systemd[1]: Started session-12.scope. Feb 9 12:51:41.141000 audit[8037]: CRED_ACQ pid=8037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:41.232965 sshd[8037]: pam_unix(sshd:session): session closed for user core Feb 9 12:51:41.234324 systemd[1]: sshd@10-139.178.91.169:22-147.75.109.163:59768.service: Deactivated successfully. Feb 9 12:51:41.234983 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 12:51:41.235001 systemd-logind[1541]: Session 12 logged out. Waiting for processes to exit. Feb 9 12:51:41.235671 systemd-logind[1541]: Removed session 12. Feb 9 12:51:41.322662 kernel: audit: type=1101 audit(1707483101.140:346): pid=8037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:41.322705 kernel: audit: type=1103 audit(1707483101.141:347): pid=8037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:41.322724 kernel: audit: type=1006 audit(1707483101.141:348): pid=8037 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 12:51:41.381179 kernel: audit: type=1300 audit(1707483101.141:348): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8261ac80 a2=3 a3=0 items=0 ppid=1 pid=8037 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:51:41.141000 audit[8037]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8261ac80 a2=3 a3=0 items=0 ppid=1 pid=8037 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:51:41.473232 kernel: audit: type=1327 audit(1707483101.141:348): proctitle=737368643A20636F7265205B707269765D Feb 9 12:51:41.141000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:51:41.503652 kernel: audit: type=1105 audit(1707483101.147:349): pid=8037 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:41.147000 audit[8037]: USER_START pid=8037 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:41.598114 kernel: audit: type=1103 audit(1707483101.148:350): pid=8040 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:41.148000 audit[8040]: CRED_ACQ pid=8040 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:41.687218 kernel: audit: type=1106 audit(1707483101.233:351): pid=8037 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:41.233000 audit[8037]: USER_END pid=8037 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:41.782576 kernel: audit: type=1104 audit(1707483101.233:352): pid=8037 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:41.233000 audit[8037]: CRED_DISP pid=8037 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:41.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.91.169:22-147.75.109.163:59768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:46.239680 systemd[1]: Started sshd@11-139.178.91.169:22-147.75.109.163:52362.service. Feb 9 12:51:46.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.91.169:22-147.75.109.163:52362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:46.266704 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:51:46.266779 kernel: audit: type=1130 audit(1707483106.239:354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.91.169:22-147.75.109.163:52362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:46.382000 audit[8065]: USER_ACCT pid=8065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:46.383205 sshd[8065]: Accepted publickey for core from 147.75.109.163 port 52362 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:51:46.384492 sshd[8065]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:51:46.386983 systemd-logind[1541]: New session 13 of user core. Feb 9 12:51:46.387471 systemd[1]: Started session-13.scope. Feb 9 12:51:46.383000 audit[8065]: CRED_ACQ pid=8065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:46.475069 sshd[8065]: pam_unix(sshd:session): session closed for user core Feb 9 12:51:46.476367 systemd[1]: sshd@11-139.178.91.169:22-147.75.109.163:52362.service: Deactivated successfully. Feb 9 12:51:46.477025 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 12:51:46.477042 systemd-logind[1541]: Session 13 logged out. Waiting for processes to exit. Feb 9 12:51:46.477683 systemd-logind[1541]: Removed session 13. Feb 9 12:51:46.564786 kernel: audit: type=1101 audit(1707483106.382:355): pid=8065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:46.564827 kernel: audit: type=1103 audit(1707483106.383:356): pid=8065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:46.564849 kernel: audit: type=1006 audit(1707483106.383:357): pid=8065 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 12:51:46.623276 kernel: audit: type=1300 audit(1707483106.383:357): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3177ef40 a2=3 a3=0 items=0 ppid=1 pid=8065 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:51:46.383000 audit[8065]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3177ef40 a2=3 a3=0 items=0 ppid=1 pid=8065 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:51:46.715214 kernel: audit: type=1327 audit(1707483106.383:357): proctitle=737368643A20636F7265205B707269765D Feb 9 12:51:46.383000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:51:46.745617 kernel: audit: type=1105 audit(1707483106.389:358): pid=8065 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:46.389000 audit[8065]: USER_START pid=8065 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:46.839981 kernel: audit: type=1103 audit(1707483106.390:359): pid=8068 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:46.390000 audit[8068]: CRED_ACQ pid=8068 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:46.929073 kernel: audit: type=1106 audit(1707483106.475:360): pid=8065 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:46.475000 audit[8065]: USER_END pid=8065 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:47.024461 kernel: audit: type=1104 audit(1707483106.475:361): pid=8065 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:46.475000 audit[8065]: CRED_DISP pid=8065 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:46.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.91.169:22-147.75.109.163:52362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:51.480984 systemd[1]: Started sshd@12-139.178.91.169:22-147.75.109.163:52368.service. Feb 9 12:51:51.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.91.169:22-147.75.109.163:52368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:51.508327 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:51:51.508367 kernel: audit: type=1130 audit(1707483111.480:363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.91.169:22-147.75.109.163:52368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:51.622000 audit[8113]: USER_ACCT pid=8113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:51.623460 sshd[8113]: Accepted publickey for core from 147.75.109.163 port 52368 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:51:51.625270 sshd[8113]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:51:51.627934 systemd-logind[1541]: New session 14 of user core. Feb 9 12:51:51.628473 systemd[1]: Started session-14.scope. Feb 9 12:51:51.624000 audit[8113]: CRED_ACQ pid=8113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:51.720262 sshd[8113]: pam_unix(sshd:session): session closed for user core Feb 9 12:51:51.721758 systemd[1]: sshd@12-139.178.91.169:22-147.75.109.163:52368.service: Deactivated successfully. Feb 9 12:51:51.722318 systemd-logind[1541]: Session 14 logged out. Waiting for processes to exit. Feb 9 12:51:51.722338 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 12:51:51.723040 systemd-logind[1541]: Removed session 14. Feb 9 12:51:51.806581 kernel: audit: type=1101 audit(1707483111.622:364): pid=8113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:51.806616 kernel: audit: type=1103 audit(1707483111.624:365): pid=8113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:51.806632 kernel: audit: type=1006 audit(1707483111.624:366): pid=8113 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 12:51:51.865062 kernel: audit: type=1300 audit(1707483111.624:366): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd617851f0 a2=3 a3=0 items=0 ppid=1 pid=8113 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:51:51.624000 audit[8113]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd617851f0 a2=3 a3=0 items=0 ppid=1 pid=8113 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:51:51.624000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:51:51.987475 kernel: audit: type=1327 audit(1707483111.624:366): proctitle=737368643A20636F7265205B707269765D Feb 9 12:51:51.987508 kernel: audit: type=1105 audit(1707483111.630:367): pid=8113 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:51.630000 audit[8113]: USER_START pid=8113 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:52.081829 kernel: audit: type=1103 audit(1707483111.631:368): pid=8116 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:51.631000 audit[8116]: CRED_ACQ pid=8116 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:52.171068 kernel: audit: type=1106 audit(1707483111.720:369): pid=8113 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:51.720000 audit[8113]: USER_END pid=8113 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:52.266465 kernel: audit: type=1104 audit(1707483111.720:370): pid=8113 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:51.720000 audit[8113]: CRED_DISP pid=8113 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:51.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.91.169:22-147.75.109.163:52368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:56.726993 systemd[1]: Started sshd@13-139.178.91.169:22-147.75.109.163:43096.service. Feb 9 12:51:56.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.91.169:22-147.75.109.163:43096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:56.753768 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:51:56.753830 kernel: audit: type=1130 audit(1707483116.726:372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.91.169:22-147.75.109.163:43096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:51:56.863000 audit[8161]: USER_ACCT pid=8161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:56.863762 sshd[8161]: Accepted publickey for core from 147.75.109.163 port 43096 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:51:56.864662 sshd[8161]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:51:56.867026 systemd-logind[1541]: New session 15 of user core. Feb 9 12:51:56.867539 systemd[1]: Started session-15.scope. Feb 9 12:51:56.864000 audit[8161]: CRED_ACQ pid=8161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:56.955790 sshd[8161]: pam_unix(sshd:session): session closed for user core Feb 9 12:51:56.957123 systemd[1]: sshd@13-139.178.91.169:22-147.75.109.163:43096.service: Deactivated successfully. Feb 9 12:51:56.957760 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 12:51:56.957770 systemd-logind[1541]: Session 15 logged out. Waiting for processes to exit. Feb 9 12:51:56.958220 systemd-logind[1541]: Removed session 15. Feb 9 12:51:57.045968 kernel: audit: type=1101 audit(1707483116.863:373): pid=8161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:57.046010 kernel: audit: type=1103 audit(1707483116.864:374): pid=8161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:57.046029 kernel: audit: type=1006 audit(1707483116.864:375): pid=8161 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 12:51:57.104474 kernel: audit: type=1300 audit(1707483116.864:375): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeb95b9b0 a2=3 a3=0 items=0 ppid=1 pid=8161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:51:56.864000 audit[8161]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeb95b9b0 a2=3 a3=0 items=0 ppid=1 pid=8161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:51:57.196575 kernel: audit: type=1327 audit(1707483116.864:375): proctitle=737368643A20636F7265205B707269765D Feb 9 12:51:56.864000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:51:57.226970 kernel: audit: type=1105 audit(1707483116.869:376): pid=8161 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:56.869000 audit[8161]: USER_START pid=8161 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:57.321297 kernel: audit: type=1103 audit(1707483116.870:377): pid=8164 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:56.870000 audit[8164]: CRED_ACQ pid=8164 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:57.410320 kernel: audit: type=1106 audit(1707483116.956:378): pid=8161 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:56.956000 audit[8161]: USER_END pid=8161 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:57.505628 kernel: audit: type=1104 audit(1707483116.956:379): pid=8161 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:56.956000 audit[8161]: CRED_DISP pid=8161 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:51:56.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.91.169:22-147.75.109.163:43096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:01.962630 systemd[1]: Started sshd@14-139.178.91.169:22-147.75.109.163:43104.service. Feb 9 12:52:01.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.91.169:22-147.75.109.163:43104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:01.989740 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:52:01.989819 kernel: audit: type=1130 audit(1707483121.962:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.91.169:22-147.75.109.163:43104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:02.100000 audit[8191]: USER_ACCT pid=8191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:02.100556 sshd[8191]: Accepted publickey for core from 147.75.109.163 port 43104 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:52:02.101721 sshd[8191]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:52:02.104114 systemd-logind[1541]: New session 16 of user core. Feb 9 12:52:02.104600 systemd[1]: Started session-16.scope. Feb 9 12:52:02.101000 audit[8191]: CRED_ACQ pid=8191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:02.194084 sshd[8191]: pam_unix(sshd:session): session closed for user core Feb 9 12:52:02.195405 systemd[1]: sshd@14-139.178.91.169:22-147.75.109.163:43104.service: Deactivated successfully. Feb 9 12:52:02.196062 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 12:52:02.196092 systemd-logind[1541]: Session 16 logged out. Waiting for processes to exit. Feb 9 12:52:02.196529 systemd-logind[1541]: Removed session 16. Feb 9 12:52:02.281954 kernel: audit: type=1101 audit(1707483122.100:382): pid=8191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:02.282005 kernel: audit: type=1103 audit(1707483122.101:383): pid=8191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:02.282024 kernel: audit: type=1006 audit(1707483122.101:384): pid=8191 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 12:52:02.101000 audit[8191]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3d947be0 a2=3 a3=0 items=0 ppid=1 pid=8191 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:02.432307 kernel: audit: type=1300 audit(1707483122.101:384): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3d947be0 a2=3 a3=0 items=0 ppid=1 pid=8191 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:02.432399 kernel: audit: type=1327 audit(1707483122.101:384): proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:02.101000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:02.106000 audit[8191]: USER_START pid=8191 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:02.557098 kernel: audit: type=1105 audit(1707483122.106:385): pid=8191 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:02.557172 kernel: audit: type=1103 audit(1707483122.106:386): pid=8194 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:02.106000 audit[8194]: CRED_ACQ pid=8194 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:02.194000 audit[8191]: USER_END pid=8191 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:02.741461 kernel: audit: type=1106 audit(1707483122.194:387): pid=8191 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:02.741538 kernel: audit: type=1104 audit(1707483122.194:388): pid=8191 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:02.194000 audit[8191]: CRED_DISP pid=8191 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:02.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.91.169:22-147.75.109.163:43104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:07.201041 systemd[1]: Started sshd@15-139.178.91.169:22-147.75.109.163:49736.service. Feb 9 12:52:07.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.91.169:22-147.75.109.163:49736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:07.227915 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:52:07.228003 kernel: audit: type=1130 audit(1707483127.200:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.91.169:22-147.75.109.163:49736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:07.338000 audit[8218]: USER_ACCT pid=8218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:07.338903 sshd[8218]: Accepted publickey for core from 147.75.109.163 port 49736 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:52:07.340648 sshd[8218]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:52:07.343071 systemd-logind[1541]: New session 17 of user core. Feb 9 12:52:07.343689 systemd[1]: Started session-17.scope. Feb 9 12:52:07.340000 audit[8218]: CRED_ACQ pid=8218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:07.432530 sshd[8218]: pam_unix(sshd:session): session closed for user core Feb 9 12:52:07.433943 systemd[1]: sshd@15-139.178.91.169:22-147.75.109.163:49736.service: Deactivated successfully. Feb 9 12:52:07.434622 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 12:52:07.434656 systemd-logind[1541]: Session 17 logged out. Waiting for processes to exit. Feb 9 12:52:07.435138 systemd-logind[1541]: Removed session 17. Feb 9 12:52:07.521590 kernel: audit: type=1101 audit(1707483127.338:391): pid=8218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:07.521633 kernel: audit: type=1103 audit(1707483127.340:392): pid=8218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:07.521652 kernel: audit: type=1006 audit(1707483127.340:393): pid=8218 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 12:52:07.580025 kernel: audit: type=1300 audit(1707483127.340:393): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf86a9560 a2=3 a3=0 items=0 ppid=1 pid=8218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:07.340000 audit[8218]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf86a9560 a2=3 a3=0 items=0 ppid=1 pid=8218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:07.671848 kernel: audit: type=1327 audit(1707483127.340:393): proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:07.340000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:07.702203 kernel: audit: type=1105 audit(1707483127.345:394): pid=8218 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:07.345000 audit[8218]: USER_START pid=8218 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:07.796471 kernel: audit: type=1103 audit(1707483127.345:395): pid=8221 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:07.345000 audit[8221]: CRED_ACQ pid=8221 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:07.885478 kernel: audit: type=1106 audit(1707483127.432:396): pid=8218 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:07.432000 audit[8218]: USER_END pid=8218 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:07.980783 kernel: audit: type=1104 audit(1707483127.432:397): pid=8218 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:07.432000 audit[8218]: CRED_DISP pid=8218 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:07.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.91.169:22-147.75.109.163:49736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:12.435345 systemd[1]: Started sshd@16-139.178.91.169:22-147.75.109.163:49750.service. Feb 9 12:52:12.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.91.169:22-147.75.109.163:49750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:12.462107 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:52:12.462191 kernel: audit: type=1130 audit(1707483132.435:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.91.169:22-147.75.109.163:49750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:12.573000 audit[8253]: USER_ACCT pid=8253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:12.573552 sshd[8253]: Accepted publickey for core from 147.75.109.163 port 49750 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:52:12.575070 sshd[8253]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:52:12.577304 systemd-logind[1541]: New session 18 of user core. Feb 9 12:52:12.577812 systemd[1]: Started session-18.scope. Feb 9 12:52:12.574000 audit[8253]: CRED_ACQ pid=8253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:12.667430 sshd[8253]: pam_unix(sshd:session): session closed for user core Feb 9 12:52:12.668939 systemd[1]: sshd@16-139.178.91.169:22-147.75.109.163:49750.service: Deactivated successfully. Feb 9 12:52:12.669621 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 12:52:12.669641 systemd-logind[1541]: Session 18 logged out. Waiting for processes to exit. Feb 9 12:52:12.670090 systemd-logind[1541]: Removed session 18. Feb 9 12:52:12.755327 kernel: audit: type=1101 audit(1707483132.573:400): pid=8253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:12.755371 kernel: audit: type=1103 audit(1707483132.574:401): pid=8253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:12.755387 kernel: audit: type=1006 audit(1707483132.574:402): pid=8253 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 9 12:52:12.813805 kernel: audit: type=1300 audit(1707483132.574:402): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6caff000 a2=3 a3=0 items=0 ppid=1 pid=8253 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:12.574000 audit[8253]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6caff000 a2=3 a3=0 items=0 ppid=1 pid=8253 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:12.905764 kernel: audit: type=1327 audit(1707483132.574:402): proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:12.574000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:12.936170 kernel: audit: type=1105 audit(1707483132.579:403): pid=8253 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:12.579000 audit[8253]: USER_START pid=8253 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:13.030523 kernel: audit: type=1103 audit(1707483132.580:404): pid=8256 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:12.580000 audit[8256]: CRED_ACQ pid=8256 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:13.119659 kernel: audit: type=1106 audit(1707483132.667:405): pid=8253 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:12.667000 audit[8253]: USER_END pid=8253 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:13.215060 kernel: audit: type=1104 audit(1707483132.667:406): pid=8253 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:12.667000 audit[8253]: CRED_DISP pid=8253 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:12.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.91.169:22-147.75.109.163:49750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:17.673955 systemd[1]: Started sshd@17-139.178.91.169:22-147.75.109.163:51540.service. Feb 9 12:52:17.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.91.169:22-147.75.109.163:51540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:17.701125 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:52:17.701173 kernel: audit: type=1130 audit(1707483137.673:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.91.169:22-147.75.109.163:51540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:17.811000 audit[8283]: USER_ACCT pid=8283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:17.812107 sshd[8283]: Accepted publickey for core from 147.75.109.163 port 51540 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:52:17.813345 sshd[8283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:52:17.815779 systemd-logind[1541]: New session 19 of user core. Feb 9 12:52:17.816238 systemd[1]: Started session-19.scope. Feb 9 12:52:17.812000 audit[8283]: CRED_ACQ pid=8283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:17.911595 sshd[8283]: pam_unix(sshd:session): session closed for user core Feb 9 12:52:17.913017 systemd[1]: sshd@17-139.178.91.169:22-147.75.109.163:51540.service: Deactivated successfully. Feb 9 12:52:17.913617 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 12:52:17.913681 systemd-logind[1541]: Session 19 logged out. Waiting for processes to exit. Feb 9 12:52:17.914091 systemd-logind[1541]: Removed session 19. Feb 9 12:52:17.993719 kernel: audit: type=1101 audit(1707483137.811:409): pid=8283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:17.993774 kernel: audit: type=1103 audit(1707483137.812:410): pid=8283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:17.993791 kernel: audit: type=1006 audit(1707483137.812:411): pid=8283 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 9 12:52:17.812000 audit[8283]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe39ed6a70 a2=3 a3=0 items=0 ppid=1 pid=8283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:18.144182 kernel: audit: type=1300 audit(1707483137.812:411): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe39ed6a70 a2=3 a3=0 items=0 ppid=1 pid=8283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:18.144216 kernel: audit: type=1327 audit(1707483137.812:411): proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:17.812000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:18.174601 kernel: audit: type=1105 audit(1707483137.817:412): pid=8283 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:17.817000 audit[8283]: USER_START pid=8283 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:18.269092 kernel: audit: type=1103 audit(1707483137.818:413): pid=8286 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:17.818000 audit[8286]: CRED_ACQ pid=8286 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:18.358222 kernel: audit: type=1106 audit(1707483137.911:414): pid=8283 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:17.911000 audit[8283]: USER_END pid=8283 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:18.453599 kernel: audit: type=1104 audit(1707483137.911:415): pid=8283 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:17.911000 audit[8283]: CRED_DISP pid=8283 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:17.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.91.169:22-147.75.109.163:51540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:20.827869 update_engine[1543]: I0209 12:52:20.827761 1543 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 12:52:20.827869 update_engine[1543]: I0209 12:52:20.827839 1543 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 12:52:20.829201 update_engine[1543]: I0209 12:52:20.829123 1543 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 12:52:20.830063 update_engine[1543]: I0209 12:52:20.829983 1543 omaha_request_params.cc:62] Current group set to lts Feb 9 12:52:20.830353 update_engine[1543]: I0209 12:52:20.830322 1543 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 12:52:20.830353 update_engine[1543]: I0209 12:52:20.830343 1543 update_attempter.cc:643] Scheduling an action processor start. Feb 9 12:52:20.830632 update_engine[1543]: I0209 12:52:20.830374 1543 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 12:52:20.830632 update_engine[1543]: I0209 12:52:20.830452 1543 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 12:52:20.830632 update_engine[1543]: I0209 12:52:20.830586 1543 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 12:52:20.830632 update_engine[1543]: I0209 12:52:20.830602 1543 omaha_request_action.cc:271] Request: Feb 9 12:52:20.830632 update_engine[1543]: Feb 9 12:52:20.830632 update_engine[1543]: Feb 9 12:52:20.830632 update_engine[1543]: Feb 9 12:52:20.830632 update_engine[1543]: Feb 9 12:52:20.830632 update_engine[1543]: Feb 9 12:52:20.830632 update_engine[1543]: Feb 9 12:52:20.830632 update_engine[1543]: Feb 9 12:52:20.830632 update_engine[1543]: Feb 9 12:52:20.830632 update_engine[1543]: I0209 12:52:20.830613 1543 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 12:52:20.831803 locksmithd[1592]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 12:52:20.833754 update_engine[1543]: I0209 12:52:20.833675 1543 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 12:52:20.833936 update_engine[1543]: E0209 12:52:20.833897 1543 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 12:52:20.834114 update_engine[1543]: I0209 12:52:20.834067 1543 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 12:52:22.917964 systemd[1]: Started sshd@18-139.178.91.169:22-147.75.109.163:51548.service. Feb 9 12:52:22.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.91.169:22-147.75.109.163:51548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:22.944866 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:52:22.944919 kernel: audit: type=1130 audit(1707483142.917:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.91.169:22-147.75.109.163:51548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:23.055000 audit[8353]: USER_ACCT pid=8353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:23.056334 sshd[8353]: Accepted publickey for core from 147.75.109.163 port 51548 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:52:23.057051 sshd[8353]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:52:23.059594 systemd-logind[1541]: New session 20 of user core. Feb 9 12:52:23.060075 systemd[1]: Started session-20.scope. Feb 9 12:52:23.056000 audit[8353]: CRED_ACQ pid=8353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:23.149095 sshd[8353]: pam_unix(sshd:session): session closed for user core Feb 9 12:52:23.150452 systemd[1]: sshd@18-139.178.91.169:22-147.75.109.163:51548.service: Deactivated successfully. Feb 9 12:52:23.151092 systemd-logind[1541]: Session 20 logged out. Waiting for processes to exit. Feb 9 12:52:23.151118 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 12:52:23.151613 systemd-logind[1541]: Removed session 20. Feb 9 12:52:23.238725 kernel: audit: type=1101 audit(1707483143.055:418): pid=8353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:23.238766 kernel: audit: type=1103 audit(1707483143.056:419): pid=8353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:23.238787 kernel: audit: type=1006 audit(1707483143.056:420): pid=8353 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Feb 9 12:52:23.297202 kernel: audit: type=1300 audit(1707483143.056:420): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe969c5f0 a2=3 a3=0 items=0 ppid=1 pid=8353 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:23.056000 audit[8353]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe969c5f0 a2=3 a3=0 items=0 ppid=1 pid=8353 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:23.389131 kernel: audit: type=1327 audit(1707483143.056:420): proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:23.056000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:23.419533 kernel: audit: type=1105 audit(1707483143.061:421): pid=8353 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:23.061000 audit[8353]: USER_START pid=8353 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:23.513925 kernel: audit: type=1103 audit(1707483143.062:422): pid=8356 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:23.062000 audit[8356]: CRED_ACQ pid=8356 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:23.603090 kernel: audit: type=1106 audit(1707483143.149:423): pid=8353 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:23.149000 audit[8353]: USER_END pid=8353 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:23.698474 kernel: audit: type=1104 audit(1707483143.149:424): pid=8353 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:23.149000 audit[8353]: CRED_DISP pid=8353 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:23.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.91.169:22-147.75.109.163:51548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:28.158382 systemd[1]: Started sshd@19-139.178.91.169:22-147.75.109.163:38744.service. Feb 9 12:52:28.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.91.169:22-147.75.109.163:38744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:28.202988 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:52:28.203067 kernel: audit: type=1130 audit(1707483148.158:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.91.169:22-147.75.109.163:38744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:28.312000 audit[8406]: USER_ACCT pid=8406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:28.312802 sshd[8406]: Accepted publickey for core from 147.75.109.163 port 38744 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:52:28.314710 sshd[8406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:52:28.317048 systemd-logind[1541]: New session 21 of user core. Feb 9 12:52:28.317724 systemd[1]: Started session-21.scope. Feb 9 12:52:28.405266 sshd[8406]: pam_unix(sshd:session): session closed for user core Feb 9 12:52:28.314000 audit[8406]: CRED_ACQ pid=8406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:28.406652 systemd[1]: sshd@19-139.178.91.169:22-147.75.109.163:38744.service: Deactivated successfully. Feb 9 12:52:28.407255 systemd-logind[1541]: Session 21 logged out. Waiting for processes to exit. Feb 9 12:52:28.407286 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 12:52:28.407874 systemd-logind[1541]: Removed session 21. Feb 9 12:52:28.496254 kernel: audit: type=1101 audit(1707483148.312:427): pid=8406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:28.496287 kernel: audit: type=1103 audit(1707483148.314:428): pid=8406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:28.496307 kernel: audit: type=1006 audit(1707483148.314:429): pid=8406 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 9 12:52:28.554733 kernel: audit: type=1300 audit(1707483148.314:429): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce245e6d0 a2=3 a3=0 items=0 ppid=1 pid=8406 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:28.314000 audit[8406]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce245e6d0 a2=3 a3=0 items=0 ppid=1 pid=8406 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:28.314000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:28.677061 kernel: audit: type=1327 audit(1707483148.314:429): proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:28.677134 kernel: audit: type=1105 audit(1707483148.319:430): pid=8406 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:28.319000 audit[8406]: USER_START pid=8406 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:28.320000 audit[8410]: CRED_ACQ pid=8410 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:28.860562 kernel: audit: type=1103 audit(1707483148.320:431): pid=8410 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:28.860633 kernel: audit: type=1106 audit(1707483148.405:432): pid=8406 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:28.405000 audit[8406]: USER_END pid=8406 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:28.955993 kernel: audit: type=1104 audit(1707483148.405:433): pid=8406 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:28.405000 audit[8406]: CRED_DISP pid=8406 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:28.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.91.169:22-147.75.109.163:38744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:30.826590 update_engine[1543]: I0209 12:52:30.826488 1543 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 12:52:30.827432 update_engine[1543]: I0209 12:52:30.826864 1543 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 12:52:30.827432 update_engine[1543]: E0209 12:52:30.827039 1543 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 12:52:30.827432 update_engine[1543]: I0209 12:52:30.827191 1543 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 12:52:33.412905 systemd[1]: Started sshd@20-139.178.91.169:22-147.75.109.163:38746.service. Feb 9 12:52:33.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.91.169:22-147.75.109.163:38746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:33.440323 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:52:33.440372 kernel: audit: type=1130 audit(1707483153.412:435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.91.169:22-147.75.109.163:38746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:33.584000 audit[8437]: USER_ACCT pid=8437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:33.585125 sshd[8437]: Accepted publickey for core from 147.75.109.163 port 38746 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:52:33.588922 sshd[8437]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:52:33.597620 systemd-logind[1541]: New session 22 of user core. Feb 9 12:52:33.599295 systemd[1]: Started session-22.scope. Feb 9 12:52:33.587000 audit[8437]: CRED_ACQ pid=8437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:33.766480 kernel: audit: type=1101 audit(1707483153.584:436): pid=8437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:33.766539 kernel: audit: type=1103 audit(1707483153.587:437): pid=8437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:33.766561 kernel: audit: type=1006 audit(1707483153.587:438): pid=8437 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 12:52:33.825035 kernel: audit: type=1300 audit(1707483153.587:438): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1f51ff00 a2=3 a3=0 items=0 ppid=1 pid=8437 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:33.587000 audit[8437]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1f51ff00 a2=3 a3=0 items=0 ppid=1 pid=8437 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:33.868482 sshd[8437]: pam_unix(sshd:session): session closed for user core Feb 9 12:52:33.869981 systemd[1]: Started sshd@21-139.178.91.169:22-147.75.109.163:38750.service. Feb 9 12:52:33.870304 systemd[1]: sshd@20-139.178.91.169:22-147.75.109.163:38746.service: Deactivated successfully. Feb 9 12:52:33.870846 systemd-logind[1541]: Session 22 logged out. Waiting for processes to exit. Feb 9 12:52:33.870888 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 12:52:33.871303 systemd-logind[1541]: Removed session 22. Feb 9 12:52:33.587000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:33.917469 kernel: audit: type=1327 audit(1707483153.587:438): proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:33.604000 audit[8437]: USER_START pid=8437 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:34.042084 kernel: audit: type=1105 audit(1707483153.604:439): pid=8437 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:34.042151 kernel: audit: type=1103 audit(1707483153.606:440): pid=8440 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:33.606000 audit[8440]: CRED_ACQ pid=8440 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:34.131266 kernel: audit: type=1106 audit(1707483153.869:441): pid=8437 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:33.869000 audit[8437]: USER_END pid=8437 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:34.226716 kernel: audit: type=1104 audit(1707483153.869:442): pid=8437 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:33.869000 audit[8437]: CRED_DISP pid=8437 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:33.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.91.169:22-147.75.109.163:38750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:33.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.91.169:22-147.75.109.163:38746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:34.326000 audit[8462]: USER_ACCT pid=8462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:34.327402 sshd[8462]: Accepted publickey for core from 147.75.109.163 port 38750 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:52:34.327000 audit[8462]: CRED_ACQ pid=8462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:34.327000 audit[8462]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffac3e9840 a2=3 a3=0 items=0 ppid=1 pid=8462 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:34.327000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:34.328150 sshd[8462]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:52:34.330306 systemd-logind[1541]: New session 23 of user core. Feb 9 12:52:34.330980 systemd[1]: Started session-23.scope. Feb 9 12:52:34.332000 audit[8462]: USER_START pid=8462 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:34.333000 audit[8467]: CRED_ACQ pid=8467 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:34.885633 sshd[8462]: pam_unix(sshd:session): session closed for user core Feb 9 12:52:34.887000 audit[8462]: USER_END pid=8462 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:34.888000 audit[8462]: CRED_DISP pid=8462 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:34.894045 systemd[1]: Started sshd@22-139.178.91.169:22-147.75.109.163:46940.service. Feb 9 12:52:34.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.91.169:22-147.75.109.163:46940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:34.895987 systemd[1]: sshd@21-139.178.91.169:22-147.75.109.163:38750.service: Deactivated successfully. Feb 9 12:52:34.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.91.169:22-147.75.109.163:38750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:34.899154 systemd-logind[1541]: Session 23 logged out. Waiting for processes to exit. Feb 9 12:52:34.899381 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 12:52:34.902164 systemd-logind[1541]: Removed session 23. Feb 9 12:52:34.959000 audit[8487]: USER_ACCT pid=8487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:34.960445 sshd[8487]: Accepted publickey for core from 147.75.109.163 port 46940 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:52:34.962000 audit[8487]: CRED_ACQ pid=8487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:34.962000 audit[8487]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee43c7840 a2=3 a3=0 items=0 ppid=1 pid=8487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:34.962000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:34.963278 sshd[8487]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:52:34.972993 systemd-logind[1541]: New session 24 of user core. Feb 9 12:52:34.975326 systemd[1]: Started session-24.scope. Feb 9 12:52:34.988000 audit[8487]: USER_START pid=8487 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:34.991000 audit[8491]: CRED_ACQ pid=8491 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:35.124767 sshd[8487]: pam_unix(sshd:session): session closed for user core Feb 9 12:52:35.124000 audit[8487]: USER_END pid=8487 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:35.125000 audit[8487]: CRED_DISP pid=8487 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:35.126134 systemd[1]: sshd@22-139.178.91.169:22-147.75.109.163:46940.service: Deactivated successfully. Feb 9 12:52:35.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.91.169:22-147.75.109.163:46940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:35.126813 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 12:52:35.126854 systemd-logind[1541]: Session 24 logged out. Waiting for processes to exit. Feb 9 12:52:35.127306 systemd-logind[1541]: Removed session 24. Feb 9 12:52:39.530151 env[1555]: time="2024-02-09T12:52:39.530097706Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:52:39.530770 env[1555]: time="2024-02-09T12:52:39.530730754Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:52:39.531372 env[1555]: time="2024-02-09T12:52:39.531319169Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:52:39.532071 env[1555]: time="2024-02-09T12:52:39.532031281Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:52:39.532682 env[1555]: time="2024-02-09T12:52:39.532639046Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 12:52:39.532968 env[1555]: time="2024-02-09T12:52:39.532954432Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 12:52:39.533793 env[1555]: time="2024-02-09T12:52:39.533763063Z" level=info msg="CreateContainer within sandbox \"baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 12:52:39.539448 env[1555]: time="2024-02-09T12:52:39.539395803Z" level=info msg="CreateContainer within sandbox \"baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"8817b63545940f43730cacbe5c7797d8d6f31db22be24c4fd7ee95749a788b88\"" Feb 9 12:52:39.539768 env[1555]: time="2024-02-09T12:52:39.539754609Z" level=info msg="StartContainer for \"8817b63545940f43730cacbe5c7797d8d6f31db22be24c4fd7ee95749a788b88\"" Feb 9 12:52:39.588857 env[1555]: time="2024-02-09T12:52:39.588805708Z" level=info msg="StartContainer for \"8817b63545940f43730cacbe5c7797d8d6f31db22be24c4fd7ee95749a788b88\" returns successfully" Feb 9 12:52:40.132165 systemd[1]: Started sshd@23-139.178.91.169:22-147.75.109.163:46956.service. Feb 9 12:52:40.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.91.169:22-147.75.109.163:46956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:40.158575 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 12:52:40.158610 kernel: audit: type=1130 audit(1707483160.131:462): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.91.169:22-147.75.109.163:46956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:40.268000 audit[8565]: USER_ACCT pid=8565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:40.269286 sshd[8565]: Accepted publickey for core from 147.75.109.163 port 46956 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:52:40.270691 sshd[8565]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:52:40.273201 systemd-logind[1541]: New session 25 of user core. Feb 9 12:52:40.273918 systemd[1]: Started session-25.scope. Feb 9 12:52:40.270000 audit[8565]: CRED_ACQ pid=8565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:40.365507 sshd[8565]: pam_unix(sshd:session): session closed for user core Feb 9 12:52:40.366996 systemd[1]: sshd@23-139.178.91.169:22-147.75.109.163:46956.service: Deactivated successfully. Feb 9 12:52:40.367651 systemd-logind[1541]: Session 25 logged out. Waiting for processes to exit. Feb 9 12:52:40.367679 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 12:52:40.368151 systemd-logind[1541]: Removed session 25. Feb 9 12:52:40.453608 kernel: audit: type=1101 audit(1707483160.268:463): pid=8565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:40.453644 kernel: audit: type=1103 audit(1707483160.270:464): pid=8565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:40.453671 kernel: audit: type=1006 audit(1707483160.270:465): pid=8565 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 12:52:40.270000 audit[8565]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef0103020 a2=3 a3=0 items=0 ppid=1 pid=8565 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:40.604350 kernel: audit: type=1300 audit(1707483160.270:465): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef0103020 a2=3 a3=0 items=0 ppid=1 pid=8565 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:40.604386 kernel: audit: type=1327 audit(1707483160.270:465): proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:40.270000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:40.275000 audit[8565]: USER_START pid=8565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:40.729346 kernel: audit: type=1105 audit(1707483160.275:466): pid=8565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:40.729373 kernel: audit: type=1103 audit(1707483160.276:467): pid=8568 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:40.276000 audit[8568]: CRED_ACQ pid=8568 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:40.818531 kernel: audit: type=1106 audit(1707483160.365:468): pid=8565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:40.365000 audit[8565]: USER_END pid=8565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:40.825686 update_engine[1543]: I0209 12:52:40.825640 1543 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 12:52:40.825852 update_engine[1543]: I0209 12:52:40.825729 1543 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 12:52:40.825852 update_engine[1543]: E0209 12:52:40.825773 1543 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 12:52:40.825852 update_engine[1543]: I0209 12:52:40.825807 1543 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 12:52:40.914027 kernel: audit: type=1104 audit(1707483160.365:469): pid=8565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:40.365000 audit[8565]: CRED_DISP pid=8565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:40.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.91.169:22-147.75.109.163:46956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:45.372348 systemd[1]: Started sshd@24-139.178.91.169:22-147.75.109.163:46854.service. Feb 9 12:52:45.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.91.169:22-147.75.109.163:46854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:45.399570 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:52:45.399602 kernel: audit: type=1130 audit(1707483165.372:471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.91.169:22-147.75.109.163:46854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:45.420615 sshd[8591]: Accepted publickey for core from 147.75.109.163 port 46854 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:52:45.421768 sshd[8591]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:52:45.424084 systemd-logind[1541]: New session 26 of user core. Feb 9 12:52:45.424858 systemd[1]: Started session-26.scope. Feb 9 12:52:45.420000 audit[8591]: USER_ACCT pid=8591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:45.529099 sshd[8591]: pam_unix(sshd:session): session closed for user core Feb 9 12:52:45.530433 systemd[1]: sshd@24-139.178.91.169:22-147.75.109.163:46854.service: Deactivated successfully. Feb 9 12:52:45.531055 systemd-logind[1541]: Session 26 logged out. Waiting for processes to exit. Feb 9 12:52:45.531089 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 12:52:45.531529 systemd-logind[1541]: Removed session 26. Feb 9 12:52:45.581469 kernel: audit: type=1101 audit(1707483165.420:472): pid=8591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:45.581498 kernel: audit: type=1103 audit(1707483165.421:473): pid=8591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:45.421000 audit[8591]: CRED_ACQ pid=8591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:45.671926 kernel: audit: type=1006 audit(1707483165.421:474): pid=8591 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 12:52:45.421000 audit[8591]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd8c7c6f0 a2=3 a3=0 items=0 ppid=1 pid=8591 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:45.822401 kernel: audit: type=1300 audit(1707483165.421:474): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd8c7c6f0 a2=3 a3=0 items=0 ppid=1 pid=8591 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:45.822434 kernel: audit: type=1327 audit(1707483165.421:474): proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:45.421000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:45.852863 kernel: audit: type=1105 audit(1707483165.426:475): pid=8591 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:45.426000 audit[8591]: USER_START pid=8591 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:45.947377 kernel: audit: type=1103 audit(1707483165.427:476): pid=8594 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:45.427000 audit[8594]: CRED_ACQ pid=8594 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:46.036457 kernel: audit: type=1106 audit(1707483165.529:477): pid=8591 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:45.529000 audit[8591]: USER_END pid=8591 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:45.529000 audit[8591]: CRED_DISP pid=8591 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:46.221193 kernel: audit: type=1104 audit(1707483165.529:478): pid=8591 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:45.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.91.169:22-147.75.109.163:46854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:50.023021 env[1555]: time="2024-02-09T12:52:50.022967553Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:52:50.023648 env[1555]: time="2024-02-09T12:52:50.023607320Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:52:50.024824 env[1555]: time="2024-02-09T12:52:50.024787525Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:52:50.025647 env[1555]: time="2024-02-09T12:52:50.025609133Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:52:50.026490 env[1555]: time="2024-02-09T12:52:50.026428382Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 12:52:50.026863 env[1555]: time="2024-02-09T12:52:50.026821323Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 12:52:50.027816 env[1555]: time="2024-02-09T12:52:50.027761066Z" level=info msg="CreateContainer within sandbox \"74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 12:52:50.032017 env[1555]: time="2024-02-09T12:52:50.031969755Z" level=info msg="CreateContainer within sandbox \"74bcc4f4b9e5106582c6d4ef96be7993461c217bd52259629fe716f9e0a05e04\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9b16ed1bf43c9ca56d6faba47de823653b41c979d097e90f150d940d1d43389d\"" Feb 9 12:52:50.032303 env[1555]: time="2024-02-09T12:52:50.032290363Z" level=info msg="StartContainer for \"9b16ed1bf43c9ca56d6faba47de823653b41c979d097e90f150d940d1d43389d\"" Feb 9 12:52:50.077653 env[1555]: time="2024-02-09T12:52:50.077598454Z" level=info msg="StartContainer for \"9b16ed1bf43c9ca56d6faba47de823653b41c979d097e90f150d940d1d43389d\" returns successfully" Feb 9 12:52:50.452704 env[1555]: time="2024-02-09T12:52:50.452652510Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:52:50.453304 env[1555]: time="2024-02-09T12:52:50.453264796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:52:50.454506 env[1555]: time="2024-02-09T12:52:50.454492374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:52:50.455246 env[1555]: time="2024-02-09T12:52:50.455211188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:52:50.455686 env[1555]: time="2024-02-09T12:52:50.455634762Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 12:52:50.455961 env[1555]: time="2024-02-09T12:52:50.455947858Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 12:52:50.456779 env[1555]: time="2024-02-09T12:52:50.456722123Z" level=info msg="CreateContainer within sandbox \"6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 12:52:50.460722 env[1555]: time="2024-02-09T12:52:50.460680421Z" level=info msg="CreateContainer within sandbox \"6725629cd74b3e0c05cd9248e097c1b882b3bb5c0632260d700490b93b93ff92\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"03e22947dd32591b13a85c391385753d1c283108debaf6cf1266265704062bc3\"" Feb 9 12:52:50.460947 env[1555]: time="2024-02-09T12:52:50.460907118Z" level=info msg="StartContainer for \"03e22947dd32591b13a85c391385753d1c283108debaf6cf1266265704062bc3\"" Feb 9 12:52:50.518916 env[1555]: time="2024-02-09T12:52:50.518891036Z" level=info msg="StartContainer for \"03e22947dd32591b13a85c391385753d1c283108debaf6cf1266265704062bc3\" returns successfully" Feb 9 12:52:50.530956 systemd[1]: Started sshd@25-139.178.91.169:22-147.75.109.163:46870.service. Feb 9 12:52:50.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.91.169:22-147.75.109.163:46870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:50.557329 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:52:50.557383 kernel: audit: type=1130 audit(1707483170.530:480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.91.169:22-147.75.109.163:46870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:50.665000 audit[8726]: USER_ACCT pid=8726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:50.665902 sshd[8726]: Accepted publickey for core from 147.75.109.163 port 46870 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:52:50.666693 sshd[8726]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:52:50.669118 systemd-logind[1541]: New session 27 of user core. Feb 9 12:52:50.669534 systemd[1]: Started session-27.scope. Feb 9 12:52:50.666000 audit[8726]: CRED_ACQ pid=8726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:50.757258 sshd[8726]: pam_unix(sshd:session): session closed for user core Feb 9 12:52:50.757400 kernel: audit: type=1101 audit(1707483170.665:481): pid=8726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:50.757435 kernel: audit: type=1103 audit(1707483170.666:482): pid=8726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:50.758669 systemd[1]: sshd@25-139.178.91.169:22-147.75.109.163:46870.service: Deactivated successfully. Feb 9 12:52:50.759222 systemd-logind[1541]: Session 27 logged out. Waiting for processes to exit. Feb 9 12:52:50.759227 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 12:52:50.759767 systemd-logind[1541]: Removed session 27. Feb 9 12:52:50.793213 kubelet[2728]: I0209 12:52:50.793187 2728 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-67bb8dc999-rpldp" podStartSLOduration=-9.22337186306162e+09 pod.CreationTimestamp="2024-02-09 12:49:57 +0000 UTC" firstStartedPulling="2024-02-09 12:49:58.580211854 +0000 UTC m=+285.298688664" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 12:52:50.792436097 +0000 UTC m=+457.510912907" watchObservedRunningTime="2024-02-09 12:52:50.793154563 +0000 UTC m=+457.511631369" Feb 9 12:52:50.825161 update_engine[1543]: I0209 12:52:50.825112 1543 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 12:52:50.825353 update_engine[1543]: I0209 12:52:50.825213 1543 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 12:52:50.825353 update_engine[1543]: E0209 12:52:50.825256 1543 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 12:52:50.825353 update_engine[1543]: I0209 12:52:50.825287 1543 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 12:52:50.825353 update_engine[1543]: I0209 12:52:50.825290 1543 omaha_request_action.cc:621] Omaha request response: Feb 9 12:52:50.825353 update_engine[1543]: E0209 12:52:50.825327 1543 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 12:52:50.825353 update_engine[1543]: I0209 12:52:50.825332 1543 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 12:52:50.825353 update_engine[1543]: I0209 12:52:50.825335 1543 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 12:52:50.825353 update_engine[1543]: I0209 12:52:50.825336 1543 update_attempter.cc:306] Processing Done. Feb 9 12:52:50.825353 update_engine[1543]: E0209 12:52:50.825345 1543 update_attempter.cc:619] Update failed. Feb 9 12:52:50.825353 update_engine[1543]: I0209 12:52:50.825345 1543 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 12:52:50.825353 update_engine[1543]: I0209 12:52:50.825347 1543 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 12:52:50.825353 update_engine[1543]: I0209 12:52:50.825349 1543 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 12:52:50.825558 update_engine[1543]: I0209 12:52:50.825392 1543 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 12:52:50.825558 update_engine[1543]: I0209 12:52:50.825404 1543 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 12:52:50.825558 update_engine[1543]: I0209 12:52:50.825407 1543 omaha_request_action.cc:271] Request: Feb 9 12:52:50.825558 update_engine[1543]: Feb 9 12:52:50.825558 update_engine[1543]: Feb 9 12:52:50.825558 update_engine[1543]: Feb 9 12:52:50.825558 update_engine[1543]: Feb 9 12:52:50.825558 update_engine[1543]: Feb 9 12:52:50.825558 update_engine[1543]: Feb 9 12:52:50.825558 update_engine[1543]: I0209 12:52:50.825408 1543 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 12:52:50.825558 update_engine[1543]: I0209 12:52:50.825456 1543 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 12:52:50.825558 update_engine[1543]: E0209 12:52:50.825484 1543 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 12:52:50.825558 update_engine[1543]: I0209 12:52:50.825510 1543 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 12:52:50.825558 update_engine[1543]: I0209 12:52:50.825513 1543 omaha_request_action.cc:621] Omaha request response: Feb 9 12:52:50.825558 update_engine[1543]: I0209 12:52:50.825515 1543 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 12:52:50.825558 update_engine[1543]: I0209 12:52:50.825517 1543 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 12:52:50.825558 update_engine[1543]: I0209 12:52:50.825518 1543 update_attempter.cc:306] Processing Done. Feb 9 12:52:50.825558 update_engine[1543]: I0209 12:52:50.825520 1543 update_attempter.cc:310] Error event sent. Feb 9 12:52:50.825558 update_engine[1543]: I0209 12:52:50.825525 1543 update_check_scheduler.cc:74] Next update check in 45m20s Feb 9 12:52:50.825847 locksmithd[1592]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 12:52:50.825847 locksmithd[1592]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 12:52:50.906101 kernel: audit: type=1006 audit(1707483170.666:483): pid=8726 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 12:52:50.906159 kernel: audit: type=1300 audit(1707483170.666:483): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd976f03b0 a2=3 a3=0 items=0 ppid=1 pid=8726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:50.666000 audit[8726]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd976f03b0 a2=3 a3=0 items=0 ppid=1 pid=8726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:50.666000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:50.998431 kernel: audit: type=1327 audit(1707483170.666:483): proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:50.671000 audit[8726]: USER_START pid=8726 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:51.122973 kernel: audit: type=1105 audit(1707483170.671:484): pid=8726 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:51.123057 kernel: audit: type=1103 audit(1707483170.672:485): pid=8738 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:50.672000 audit[8738]: CRED_ACQ pid=8738 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:51.212109 kernel: audit: type=1106 audit(1707483170.757:486): pid=8726 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:50.757000 audit[8726]: USER_END pid=8726 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:51.307531 kernel: audit: type=1104 audit(1707483170.757:487): pid=8726 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:50.757000 audit[8726]: CRED_DISP pid=8726 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:50.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.91.169:22-147.75.109.163:46870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:50.813000 audit[8787]: NETFILTER_CFG table=filter:131 family=2 entries=8 op=nft_register_rule pid=8787 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:52:50.813000 audit[8787]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe64ad0820 a2=0 a3=7ffe64ad080c items=0 ppid=2992 pid=8787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:50.813000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:52:50.814000 audit[8787]: NETFILTER_CFG table=nat:132 family=2 entries=78 op=nft_register_rule pid=8787 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:52:50.814000 audit[8787]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe64ad0820 a2=0 a3=7ffe64ad080c items=0 ppid=2992 pid=8787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:50.814000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:52:51.434000 audit[8813]: NETFILTER_CFG table=filter:133 family=2 entries=8 op=nft_register_rule pid=8813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:52:51.434000 audit[8813]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffde3a01280 a2=0 a3=7ffde3a0126c items=0 ppid=2992 pid=8813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:51.434000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:52:51.455000 audit[8813]: NETFILTER_CFG table=nat:134 family=2 entries=78 op=nft_register_rule pid=8813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:52:51.455000 audit[8813]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffde3a01280 a2=0 a3=7ffde3a0126c items=0 ppid=2992 pid=8813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:51.455000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:52:55.765054 systemd[1]: Started sshd@26-139.178.91.169:22-147.75.109.163:39274.service. Feb 9 12:52:55.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.91.169:22-147.75.109.163:39274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:55.792199 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 12:52:55.792255 kernel: audit: type=1130 audit(1707483175.764:493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.91.169:22-147.75.109.163:39274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:55.902000 audit[8839]: USER_ACCT pid=8839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:55.902880 sshd[8839]: Accepted publickey for core from 147.75.109.163 port 39274 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:52:55.904661 sshd[8839]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:52:55.907054 systemd-logind[1541]: New session 28 of user core. Feb 9 12:52:55.907847 systemd[1]: Started session-28.scope. Feb 9 12:52:55.904000 audit[8839]: CRED_ACQ pid=8839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:56.002587 sshd[8839]: pam_unix(sshd:session): session closed for user core Feb 9 12:52:56.004041 systemd[1]: sshd@26-139.178.91.169:22-147.75.109.163:39274.service: Deactivated successfully. Feb 9 12:52:56.004692 systemd-logind[1541]: Session 28 logged out. Waiting for processes to exit. Feb 9 12:52:56.004720 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 12:52:56.005245 systemd-logind[1541]: Removed session 28. Feb 9 12:52:56.086589 kernel: audit: type=1101 audit(1707483175.902:494): pid=8839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:56.086641 kernel: audit: type=1103 audit(1707483175.904:495): pid=8839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:56.086662 kernel: audit: type=1006 audit(1707483175.904:496): pid=8839 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 12:52:56.145195 kernel: audit: type=1300 audit(1707483175.904:496): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff31559510 a2=3 a3=0 items=0 ppid=1 pid=8839 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:55.904000 audit[8839]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff31559510 a2=3 a3=0 items=0 ppid=1 pid=8839 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:56.237199 kernel: audit: type=1327 audit(1707483175.904:496): proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:55.904000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:52:56.267618 kernel: audit: type=1105 audit(1707483175.909:497): pid=8839 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:55.909000 audit[8839]: USER_START pid=8839 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:56.362072 kernel: audit: type=1103 audit(1707483175.910:498): pid=8842 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:55.910000 audit[8842]: CRED_ACQ pid=8842 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:56.451217 kernel: audit: type=1106 audit(1707483176.002:499): pid=8839 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:56.002000 audit[8839]: USER_END pid=8839 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:56.546669 kernel: audit: type=1104 audit(1707483176.002:500): pid=8839 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:56.002000 audit[8839]: CRED_DISP pid=8839 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:52:56.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.91.169:22-147.75.109.163:39274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:52:58.128848 kubelet[2728]: I0209 12:52:58.128828 2728 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-67bb8dc999-z7rkr" podStartSLOduration=-9.223371855725971e+09 pod.CreationTimestamp="2024-02-09 12:49:57 +0000 UTC" firstStartedPulling="2024-02-09 12:49:58.591429041 +0000 UTC m=+285.309905847" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 12:52:50.797959123 +0000 UTC m=+457.516435934" watchObservedRunningTime="2024-02-09 12:52:58.128805438 +0000 UTC m=+464.847282245" Feb 9 12:52:58.149000 audit[8931]: NETFILTER_CFG table=filter:135 family=2 entries=7 op=nft_register_rule pid=8931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:52:58.149000 audit[8931]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffca85d1420 a2=0 a3=7ffca85d140c items=0 ppid=2992 pid=8931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:58.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:52:58.150000 audit[8931]: NETFILTER_CFG table=nat:136 family=2 entries=85 op=nft_register_chain pid=8931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:52:58.150000 audit[8931]: SYSCALL arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7ffca85d1420 a2=0 a3=7ffca85d140c items=0 ppid=2992 pid=8931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:58.150000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:52:58.190000 audit[8957]: NETFILTER_CFG table=filter:137 family=2 entries=6 op=nft_register_rule pid=8957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:52:58.190000 audit[8957]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fffcf7df080 a2=0 a3=7fffcf7df06c items=0 ppid=2992 pid=8957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:58.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:52:58.191000 audit[8957]: NETFILTER_CFG table=nat:138 family=2 entries=92 op=nft_register_chain pid=8957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:52:58.191000 audit[8957]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7fffcf7df080 a2=0 a3=7fffcf7df06c items=0 ppid=2992 pid=8957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:52:58.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:53:01.005938 systemd[1]: Started sshd@27-139.178.91.169:22-147.75.109.163:39284.service. Feb 9 12:53:01.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.91.169:22-147.75.109.163:39284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:01.033140 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 12:53:01.033194 kernel: audit: type=1130 audit(1707483181.004:506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.91.169:22-147.75.109.163:39284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:01.143000 audit[8961]: USER_ACCT pid=8961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:01.143941 sshd[8961]: Accepted publickey for core from 147.75.109.163 port 39284 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:53:01.145070 sshd[8961]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:53:01.147759 systemd-logind[1541]: New session 29 of user core. Feb 9 12:53:01.148165 systemd[1]: Started session-29.scope. Feb 9 12:53:01.143000 audit[8961]: CRED_ACQ pid=8961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:01.237688 sshd[8961]: pam_unix(sshd:session): session closed for user core Feb 9 12:53:01.239136 systemd[1]: sshd@27-139.178.91.169:22-147.75.109.163:39284.service: Deactivated successfully. Feb 9 12:53:01.239797 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 12:53:01.239808 systemd-logind[1541]: Session 29 logged out. Waiting for processes to exit. Feb 9 12:53:01.240291 systemd-logind[1541]: Removed session 29. Feb 9 12:53:01.325667 kernel: audit: type=1101 audit(1707483181.143:507): pid=8961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:01.325700 kernel: audit: type=1103 audit(1707483181.143:508): pid=8961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:01.325719 kernel: audit: type=1006 audit(1707483181.143:509): pid=8961 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 9 12:53:01.143000 audit[8961]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1738bac0 a2=3 a3=0 items=0 ppid=1 pid=8961 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:01.476217 kernel: audit: type=1300 audit(1707483181.143:509): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1738bac0 a2=3 a3=0 items=0 ppid=1 pid=8961 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:01.476243 kernel: audit: type=1327 audit(1707483181.143:509): proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:01.143000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:01.506663 kernel: audit: type=1105 audit(1707483181.148:510): pid=8961 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:01.148000 audit[8961]: USER_START pid=8961 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:01.601128 kernel: audit: type=1103 audit(1707483181.149:511): pid=8964 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:01.149000 audit[8964]: CRED_ACQ pid=8964 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:01.690307 kernel: audit: type=1106 audit(1707483181.237:512): pid=8961 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:01.237000 audit[8961]: USER_END pid=8961 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:01.237000 audit[8961]: CRED_DISP pid=8961 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:01.786491 kernel: audit: type=1104 audit(1707483181.237:513): pid=8961 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:01.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.91.169:22-147.75.109.163:39284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:06.245214 systemd[1]: Started sshd@28-139.178.91.169:22-147.75.109.163:43110.service. Feb 9 12:53:06.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.91.169:22-147.75.109.163:43110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:06.272588 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:53:06.272641 kernel: audit: type=1130 audit(1707483186.243:515): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.91.169:22-147.75.109.163:43110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:06.382000 audit[8987]: USER_ACCT pid=8987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:06.383751 sshd[8987]: Accepted publickey for core from 147.75.109.163 port 43110 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:53:06.384699 sshd[8987]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:53:06.387053 systemd-logind[1541]: New session 30 of user core. Feb 9 12:53:06.387586 systemd[1]: Started session-30.scope. Feb 9 12:53:06.466121 sshd[8987]: pam_unix(sshd:session): session closed for user core Feb 9 12:53:06.467501 systemd[1]: sshd@28-139.178.91.169:22-147.75.109.163:43110.service: Deactivated successfully. Feb 9 12:53:06.468112 systemd[1]: session-30.scope: Deactivated successfully. Feb 9 12:53:06.468145 systemd-logind[1541]: Session 30 logged out. Waiting for processes to exit. Feb 9 12:53:06.468623 systemd-logind[1541]: Removed session 30. Feb 9 12:53:06.383000 audit[8987]: CRED_ACQ pid=8987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:06.565467 kernel: audit: type=1101 audit(1707483186.382:516): pid=8987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:06.565503 kernel: audit: type=1103 audit(1707483186.383:517): pid=8987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:06.565523 kernel: audit: type=1006 audit(1707483186.383:518): pid=8987 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Feb 9 12:53:06.624028 kernel: audit: type=1300 audit(1707483186.383:518): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc69a35b70 a2=3 a3=0 items=0 ppid=1 pid=8987 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:06.383000 audit[8987]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc69a35b70 a2=3 a3=0 items=0 ppid=1 pid=8987 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:06.716060 kernel: audit: type=1327 audit(1707483186.383:518): proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:06.383000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:06.746477 kernel: audit: type=1105 audit(1707483186.388:519): pid=8987 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:06.388000 audit[8987]: USER_START pid=8987 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:06.840897 kernel: audit: type=1103 audit(1707483186.388:520): pid=8990 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:06.388000 audit[8990]: CRED_ACQ pid=8990 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:06.930003 kernel: audit: type=1106 audit(1707483186.465:521): pid=8987 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:06.465000 audit[8987]: USER_END pid=8987 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:06.465000 audit[8987]: CRED_DISP pid=8987 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:07.114617 kernel: audit: type=1104 audit(1707483186.465:522): pid=8987 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:06.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.91.169:22-147.75.109.163:43110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:11.473300 systemd[1]: Started sshd@29-139.178.91.169:22-147.75.109.163:43114.service. Feb 9 12:53:11.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.91.169:22-147.75.109.163:43114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:11.500354 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:53:11.500423 kernel: audit: type=1130 audit(1707483191.473:524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.91.169:22-147.75.109.163:43114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:11.611670 sshd[9015]: Accepted publickey for core from 147.75.109.163 port 43114 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:53:11.610000 audit[9015]: USER_ACCT pid=9015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:11.613919 sshd[9015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:53:11.616674 systemd-logind[1541]: New session 31 of user core. Feb 9 12:53:11.617092 systemd[1]: Started session-31.scope. Feb 9 12:53:11.696384 sshd[9015]: pam_unix(sshd:session): session closed for user core Feb 9 12:53:11.697822 systemd[1]: sshd@29-139.178.91.169:22-147.75.109.163:43114.service: Deactivated successfully. Feb 9 12:53:11.698369 systemd-logind[1541]: Session 31 logged out. Waiting for processes to exit. Feb 9 12:53:11.698424 systemd[1]: session-31.scope: Deactivated successfully. Feb 9 12:53:11.698981 systemd-logind[1541]: Removed session 31. Feb 9 12:53:11.612000 audit[9015]: CRED_ACQ pid=9015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:11.793367 kernel: audit: type=1101 audit(1707483191.610:525): pid=9015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:11.793405 kernel: audit: type=1103 audit(1707483191.612:526): pid=9015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:11.793422 kernel: audit: type=1006 audit(1707483191.612:527): pid=9015 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Feb 9 12:53:11.851861 kernel: audit: type=1300 audit(1707483191.612:527): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd12e89db0 a2=3 a3=0 items=0 ppid=1 pid=9015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:11.612000 audit[9015]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd12e89db0 a2=3 a3=0 items=0 ppid=1 pid=9015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:11.612000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:11.974151 kernel: audit: type=1327 audit(1707483191.612:527): proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:11.974175 kernel: audit: type=1105 audit(1707483191.617:528): pid=9015 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:11.617000 audit[9015]: USER_START pid=9015 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:12.068464 kernel: audit: type=1103 audit(1707483191.618:529): pid=9018 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:11.618000 audit[9018]: CRED_ACQ pid=9018 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:11.695000 audit[9015]: USER_END pid=9015 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:12.252863 kernel: audit: type=1106 audit(1707483191.695:530): pid=9015 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:12.252896 kernel: audit: type=1104 audit(1707483191.695:531): pid=9015 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:11.695000 audit[9015]: CRED_DISP pid=9015 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:11.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.91.169:22-147.75.109.163:43114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:15.519010 env[1555]: time="2024-02-09T12:53:15.518976660Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:53:15.519705 env[1555]: time="2024-02-09T12:53:15.519695494Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:53:15.520246 env[1555]: time="2024-02-09T12:53:15.520238475Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:53:15.521121 env[1555]: time="2024-02-09T12:53:15.521077075Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:53:15.521246 env[1555]: time="2024-02-09T12:53:15.521234114Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 12:53:15.522195 env[1555]: time="2024-02-09T12:53:15.522150709Z" level=info msg="CreateContainer within sandbox \"baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 12:53:15.526695 env[1555]: time="2024-02-09T12:53:15.526679868Z" level=info msg="CreateContainer within sandbox \"baaed419fa21b63a004efa401d45d6c603457645f12836302c3bc5d5c0396da2\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f643ef64d80eb7c64f29101d6868245160344fd0b9257644bbae738597496887\"" Feb 9 12:53:15.526952 env[1555]: time="2024-02-09T12:53:15.526939175Z" level=info msg="StartContainer for \"f643ef64d80eb7c64f29101d6868245160344fd0b9257644bbae738597496887\"" Feb 9 12:53:15.564500 env[1555]: time="2024-02-09T12:53:15.564403442Z" level=info msg="StartContainer for \"f643ef64d80eb7c64f29101d6868245160344fd0b9257644bbae738597496887\" returns successfully" Feb 9 12:53:15.780387 kubelet[2728]: I0209 12:53:15.780226 2728 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 12:53:15.780387 kubelet[2728]: I0209 12:53:15.780322 2728 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 12:53:15.892115 kubelet[2728]: I0209 12:53:15.892057 2728 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-2lnwr" podStartSLOduration=-9.223371572962809e+09 pod.CreationTimestamp="2024-02-09 12:45:32 +0000 UTC" firstStartedPulling="2024-02-09 12:49:35.749904576 +0000 UTC m=+262.468381441" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 12:53:15.890596194 +0000 UTC m=+482.609073073" watchObservedRunningTime="2024-02-09 12:53:15.891967315 +0000 UTC m=+482.610444178" Feb 9 12:53:16.702626 systemd[1]: Started sshd@30-139.178.91.169:22-147.75.109.163:35190.service. Feb 9 12:53:16.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.91.169:22-147.75.109.163:35190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:16.729822 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:53:16.729877 kernel: audit: type=1130 audit(1707483196.702:533): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.91.169:22-147.75.109.163:35190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:16.840000 audit[9086]: USER_ACCT pid=9086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:16.841121 sshd[9086]: Accepted publickey for core from 147.75.109.163 port 35190 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:53:16.843203 sshd[9086]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:53:16.845785 systemd-logind[1541]: New session 32 of user core. Feb 9 12:53:16.846259 systemd[1]: Started session-32.scope. Feb 9 12:53:16.924385 sshd[9086]: pam_unix(sshd:session): session closed for user core Feb 9 12:53:16.925858 systemd[1]: sshd@30-139.178.91.169:22-147.75.109.163:35190.service: Deactivated successfully. Feb 9 12:53:16.926431 systemd-logind[1541]: Session 32 logged out. Waiting for processes to exit. Feb 9 12:53:16.926438 systemd[1]: session-32.scope: Deactivated successfully. Feb 9 12:53:16.927221 systemd-logind[1541]: Removed session 32. Feb 9 12:53:16.842000 audit[9086]: CRED_ACQ pid=9086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:17.023978 kernel: audit: type=1101 audit(1707483196.840:534): pid=9086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:17.024009 kernel: audit: type=1103 audit(1707483196.842:535): pid=9086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:17.024022 kernel: audit: type=1006 audit(1707483196.842:536): pid=9086 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Feb 9 12:53:17.082472 kernel: audit: type=1300 audit(1707483196.842:536): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce986ded0 a2=3 a3=0 items=0 ppid=1 pid=9086 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:16.842000 audit[9086]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce986ded0 a2=3 a3=0 items=0 ppid=1 pid=9086 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:17.174324 kernel: audit: type=1327 audit(1707483196.842:536): proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:16.842000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:17.204727 kernel: audit: type=1105 audit(1707483196.848:537): pid=9086 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:16.848000 audit[9086]: USER_START pid=9086 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:17.299033 kernel: audit: type=1103 audit(1707483196.848:538): pid=9089 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:16.848000 audit[9089]: CRED_ACQ pid=9089 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:17.388088 kernel: audit: type=1106 audit(1707483196.924:539): pid=9086 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:16.924000 audit[9086]: USER_END pid=9086 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:17.483383 kernel: audit: type=1104 audit(1707483196.924:540): pid=9086 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:16.924000 audit[9086]: CRED_DISP pid=9086 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:16.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.91.169:22-147.75.109.163:35190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:21.931166 systemd[1]: Started sshd@31-139.178.91.169:22-147.75.109.163:35192.service. Feb 9 12:53:21.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.91.169:22-147.75.109.163:35192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:21.958310 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:53:21.958406 kernel: audit: type=1130 audit(1707483201.930:542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.91.169:22-147.75.109.163:35192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:22.069815 sshd[9152]: Accepted publickey for core from 147.75.109.163 port 35192 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:53:22.069000 audit[9152]: USER_ACCT pid=9152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:22.070587 sshd[9152]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:53:22.073038 systemd-logind[1541]: New session 33 of user core. Feb 9 12:53:22.073568 systemd[1]: Started session-33.scope. Feb 9 12:53:22.153393 sshd[9152]: pam_unix(sshd:session): session closed for user core Feb 9 12:53:22.154837 systemd[1]: sshd@31-139.178.91.169:22-147.75.109.163:35192.service: Deactivated successfully. Feb 9 12:53:22.155429 systemd-logind[1541]: Session 33 logged out. Waiting for processes to exit. Feb 9 12:53:22.155437 systemd[1]: session-33.scope: Deactivated successfully. Feb 9 12:53:22.156216 systemd-logind[1541]: Removed session 33. Feb 9 12:53:22.069000 audit[9152]: CRED_ACQ pid=9152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:22.251936 kernel: audit: type=1101 audit(1707483202.069:543): pid=9152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:22.251971 kernel: audit: type=1103 audit(1707483202.069:544): pid=9152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:22.251985 kernel: audit: type=1006 audit(1707483202.070:545): pid=9152 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 Feb 9 12:53:22.310399 kernel: audit: type=1300 audit(1707483202.070:545): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9ea4b230 a2=3 a3=0 items=0 ppid=1 pid=9152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:22.070000 audit[9152]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9ea4b230 a2=3 a3=0 items=0 ppid=1 pid=9152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:22.402286 kernel: audit: type=1327 audit(1707483202.070:545): proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:22.070000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:22.432690 kernel: audit: type=1105 audit(1707483202.075:546): pid=9152 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:22.075000 audit[9152]: USER_START pid=9152 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:22.527045 kernel: audit: type=1103 audit(1707483202.076:547): pid=9155 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:22.076000 audit[9155]: CRED_ACQ pid=9155 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:22.153000 audit[9152]: USER_END pid=9152 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:22.711462 kernel: audit: type=1106 audit(1707483202.153:548): pid=9152 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:22.711494 kernel: audit: type=1104 audit(1707483202.153:549): pid=9152 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:22.153000 audit[9152]: CRED_DISP pid=9152 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:22.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.91.169:22-147.75.109.163:35192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:27.161040 systemd[1]: Started sshd@32-139.178.91.169:22-147.75.109.163:40548.service. Feb 9 12:53:27.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.91.169:22-147.75.109.163:40548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:27.188335 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:53:27.188374 kernel: audit: type=1130 audit(1707483207.161:551): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.91.169:22-147.75.109.163:40548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:27.297000 audit[9203]: USER_ACCT pid=9203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:27.298113 sshd[9203]: Accepted publickey for core from 147.75.109.163 port 40548 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:53:27.299472 sshd[9203]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:53:27.302056 systemd-logind[1541]: New session 34 of user core. Feb 9 12:53:27.302508 systemd[1]: Started session-34.scope. Feb 9 12:53:27.298000 audit[9203]: CRED_ACQ pid=9203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:27.482041 kernel: audit: type=1101 audit(1707483207.297:552): pid=9203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:27.482103 kernel: audit: type=1103 audit(1707483207.298:553): pid=9203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:27.482138 kernel: audit: type=1006 audit(1707483207.298:554): pid=9203 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=34 res=1 Feb 9 12:53:27.298000 audit[9203]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd29d5540 a2=3 a3=0 items=0 ppid=1 pid=9203 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:27.632515 kernel: audit: type=1300 audit(1707483207.298:554): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd29d5540 a2=3 a3=0 items=0 ppid=1 pid=9203 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:27.632604 kernel: audit: type=1327 audit(1707483207.298:554): proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:27.298000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:27.632783 sshd[9203]: pam_unix(sshd:session): session closed for user core Feb 9 12:53:27.634032 systemd[1]: sshd@32-139.178.91.169:22-147.75.109.163:40548.service: Deactivated successfully. Feb 9 12:53:27.634653 systemd-logind[1541]: Session 34 logged out. Waiting for processes to exit. Feb 9 12:53:27.634701 systemd[1]: session-34.scope: Deactivated successfully. Feb 9 12:53:27.635230 systemd-logind[1541]: Removed session 34. Feb 9 12:53:27.663024 kernel: audit: type=1105 audit(1707483207.304:555): pid=9203 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:27.304000 audit[9203]: USER_START pid=9203 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:27.757472 kernel: audit: type=1103 audit(1707483207.305:556): pid=9206 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:27.305000 audit[9206]: CRED_ACQ pid=9206 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:27.846516 kernel: audit: type=1106 audit(1707483207.632:557): pid=9203 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:27.632000 audit[9203]: USER_END pid=9203 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:27.941930 kernel: audit: type=1104 audit(1707483207.632:558): pid=9203 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:27.632000 audit[9203]: CRED_DISP pid=9203 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:27.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.91.169:22-147.75.109.163:40548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:32.582051 systemd[1]: Started sshd@33-139.178.91.169:22-147.75.109.163:40558.service. Feb 9 12:53:32.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.91.169:22-147.75.109.163:40558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:32.609319 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:53:32.609383 kernel: audit: type=1130 audit(1707483212.581:560): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.91.169:22-147.75.109.163:40558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:32.720000 audit[9271]: USER_ACCT pid=9271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:32.720883 sshd[9271]: Accepted publickey for core from 147.75.109.163 port 40558 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:53:32.722498 sshd[9271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:53:32.725096 systemd-logind[1541]: New session 35 of user core. Feb 9 12:53:32.725684 systemd[1]: Started session-35.scope. Feb 9 12:53:32.807161 sshd[9271]: pam_unix(sshd:session): session closed for user core Feb 9 12:53:32.808474 systemd[1]: sshd@33-139.178.91.169:22-147.75.109.163:40558.service: Deactivated successfully. Feb 9 12:53:32.809128 systemd-logind[1541]: Session 35 logged out. Waiting for processes to exit. Feb 9 12:53:32.809142 systemd[1]: session-35.scope: Deactivated successfully. Feb 9 12:53:32.809836 systemd-logind[1541]: Removed session 35. Feb 9 12:53:32.721000 audit[9271]: CRED_ACQ pid=9271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:32.904696 kernel: audit: type=1101 audit(1707483212.720:561): pid=9271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:32.904783 kernel: audit: type=1103 audit(1707483212.721:562): pid=9271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:32.904827 kernel: audit: type=1006 audit(1707483212.721:563): pid=9271 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=35 res=1 Feb 9 12:53:32.721000 audit[9271]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3a533aa0 a2=3 a3=0 items=0 ppid=1 pid=9271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:33.055180 kernel: audit: type=1300 audit(1707483212.721:563): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3a533aa0 a2=3 a3=0 items=0 ppid=1 pid=9271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:33.055252 kernel: audit: type=1327 audit(1707483212.721:563): proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:32.721000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:32.727000 audit[9271]: USER_START pid=9271 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:33.180006 kernel: audit: type=1105 audit(1707483212.727:564): pid=9271 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:33.180061 kernel: audit: type=1103 audit(1707483212.728:565): pid=9274 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:32.728000 audit[9274]: CRED_ACQ pid=9274 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:32.807000 audit[9271]: USER_END pid=9271 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:33.269407 kernel: audit: type=1106 audit(1707483212.807:566): pid=9271 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:32.807000 audit[9271]: CRED_DISP pid=9271 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:33.453754 kernel: audit: type=1104 audit(1707483212.807:567): pid=9271 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:32.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.91.169:22-147.75.109.163:40558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:37.813322 systemd[1]: Started sshd@34-139.178.91.169:22-147.75.109.163:45602.service. Feb 9 12:53:37.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.91.169:22-147.75.109.163:45602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:37.840343 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:53:37.840515 kernel: audit: type=1130 audit(1707483217.813:569): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.91.169:22-147.75.109.163:45602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:37.951385 sshd[9297]: Accepted publickey for core from 147.75.109.163 port 45602 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:53:37.950000 audit[9297]: USER_ACCT pid=9297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:37.952698 sshd[9297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:53:37.955099 systemd-logind[1541]: New session 36 of user core. Feb 9 12:53:37.955512 systemd[1]: Started session-36.scope. Feb 9 12:53:38.035262 sshd[9297]: pam_unix(sshd:session): session closed for user core Feb 9 12:53:38.036789 systemd[1]: sshd@34-139.178.91.169:22-147.75.109.163:45602.service: Deactivated successfully. Feb 9 12:53:38.037339 systemd-logind[1541]: Session 36 logged out. Waiting for processes to exit. Feb 9 12:53:38.037376 systemd[1]: session-36.scope: Deactivated successfully. Feb 9 12:53:38.037912 systemd-logind[1541]: Removed session 36. Feb 9 12:53:37.952000 audit[9297]: CRED_ACQ pid=9297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:38.133052 kernel: audit: type=1101 audit(1707483217.950:570): pid=9297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:38.133117 kernel: audit: type=1103 audit(1707483217.952:571): pid=9297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:38.133148 kernel: audit: type=1006 audit(1707483217.952:572): pid=9297 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=36 res=1 Feb 9 12:53:37.952000 audit[9297]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed016a870 a2=3 a3=0 items=0 ppid=1 pid=9297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:38.283431 kernel: audit: type=1300 audit(1707483217.952:572): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed016a870 a2=3 a3=0 items=0 ppid=1 pid=9297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:38.283492 kernel: audit: type=1327 audit(1707483217.952:572): proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:37.952000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:37.957000 audit[9297]: USER_START pid=9297 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:38.408204 kernel: audit: type=1105 audit(1707483217.957:573): pid=9297 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:38.408254 kernel: audit: type=1103 audit(1707483217.957:574): pid=9300 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:37.957000 audit[9300]: CRED_ACQ pid=9300 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:38.035000 audit[9297]: USER_END pid=9297 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:38.592602 kernel: audit: type=1106 audit(1707483218.035:575): pid=9297 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:38.592660 kernel: audit: type=1104 audit(1707483218.035:576): pid=9297 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:38.035000 audit[9297]: CRED_DISP pid=9297 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:38.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.91.169:22-147.75.109.163:45602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:43.041723 systemd[1]: Started sshd@35-139.178.91.169:22-147.75.109.163:45606.service. Feb 9 12:53:43.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.91.169:22-147.75.109.163:45606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:43.068889 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:53:43.069026 kernel: audit: type=1130 audit(1707483223.041:578): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.91.169:22-147.75.109.163:45606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:43.179711 sshd[9324]: Accepted publickey for core from 147.75.109.163 port 45606 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:53:43.179000 audit[9324]: USER_ACCT pid=9324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:43.180891 sshd[9324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:53:43.183093 systemd-logind[1541]: New session 37 of user core. Feb 9 12:53:43.183618 systemd[1]: Started session-37.scope. Feb 9 12:53:43.261455 sshd[9324]: pam_unix(sshd:session): session closed for user core Feb 9 12:53:43.262949 systemd[1]: sshd@35-139.178.91.169:22-147.75.109.163:45606.service: Deactivated successfully. Feb 9 12:53:43.263605 systemd[1]: session-37.scope: Deactivated successfully. Feb 9 12:53:43.263623 systemd-logind[1541]: Session 37 logged out. Waiting for processes to exit. Feb 9 12:53:43.264051 systemd-logind[1541]: Removed session 37. Feb 9 12:53:43.180000 audit[9324]: CRED_ACQ pid=9324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:43.361486 kernel: audit: type=1101 audit(1707483223.179:579): pid=9324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:43.361557 kernel: audit: type=1103 audit(1707483223.180:580): pid=9324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:43.361597 kernel: audit: type=1006 audit(1707483223.180:581): pid=9324 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=37 res=1 Feb 9 12:53:43.180000 audit[9324]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1e322350 a2=3 a3=0 items=0 ppid=1 pid=9324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:43.511851 kernel: audit: type=1300 audit(1707483223.180:581): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1e322350 a2=3 a3=0 items=0 ppid=1 pid=9324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:43.511906 kernel: audit: type=1327 audit(1707483223.180:581): proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:43.180000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:43.185000 audit[9324]: USER_START pid=9324 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:43.636588 kernel: audit: type=1105 audit(1707483223.185:582): pid=9324 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:43.636642 kernel: audit: type=1103 audit(1707483223.185:583): pid=9327 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:43.185000 audit[9327]: CRED_ACQ pid=9327 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:43.261000 audit[9324]: USER_END pid=9324 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:43.726467 kernel: audit: type=1106 audit(1707483223.261:584): pid=9324 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:43.261000 audit[9324]: CRED_DISP pid=9324 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:43.821463 kernel: audit: type=1104 audit(1707483223.261:585): pid=9324 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:43.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.91.169:22-147.75.109.163:45606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:48.268181 systemd[1]: Started sshd@36-139.178.91.169:22-147.75.109.163:52886.service. Feb 9 12:53:48.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.91.169:22-147.75.109.163:52886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:48.295710 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:53:48.295755 kernel: audit: type=1130 audit(1707483228.267:587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.91.169:22-147.75.109.163:52886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:48.406000 audit[9349]: USER_ACCT pid=9349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:48.406727 sshd[9349]: Accepted publickey for core from 147.75.109.163 port 52886 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:53:48.408715 sshd[9349]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:53:48.411020 systemd-logind[1541]: New session 38 of user core. Feb 9 12:53:48.411394 systemd[1]: Started session-38.scope. Feb 9 12:53:48.489374 sshd[9349]: pam_unix(sshd:session): session closed for user core Feb 9 12:53:48.490869 systemd[1]: sshd@36-139.178.91.169:22-147.75.109.163:52886.service: Deactivated successfully. Feb 9 12:53:48.491455 systemd[1]: session-38.scope: Deactivated successfully. Feb 9 12:53:48.491481 systemd-logind[1541]: Session 38 logged out. Waiting for processes to exit. Feb 9 12:53:48.491969 systemd-logind[1541]: Removed session 38. Feb 9 12:53:48.408000 audit[9349]: CRED_ACQ pid=9349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:48.588416 kernel: audit: type=1101 audit(1707483228.406:588): pid=9349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:48.588450 kernel: audit: type=1103 audit(1707483228.408:589): pid=9349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:48.588470 kernel: audit: type=1006 audit(1707483228.408:590): pid=9349 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=38 res=1 Feb 9 12:53:48.408000 audit[9349]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc945a6650 a2=3 a3=0 items=0 ppid=1 pid=9349 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:48.738793 kernel: audit: type=1300 audit(1707483228.408:590): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc945a6650 a2=3 a3=0 items=0 ppid=1 pid=9349 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:48.738822 kernel: audit: type=1327 audit(1707483228.408:590): proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:48.408000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:48.413000 audit[9349]: USER_START pid=9349 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:48.863598 kernel: audit: type=1105 audit(1707483228.413:591): pid=9349 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:48.863631 kernel: audit: type=1103 audit(1707483228.413:592): pid=9352 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:48.413000 audit[9352]: CRED_ACQ pid=9352 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:48.952617 kernel: audit: type=1106 audit(1707483228.489:593): pid=9349 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:48.489000 audit[9349]: USER_END pid=9349 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:49.047909 kernel: audit: type=1104 audit(1707483228.489:594): pid=9349 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:48.489000 audit[9349]: CRED_DISP pid=9349 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:48.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.91.169:22-147.75.109.163:52886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:53.496950 systemd[1]: Started sshd@37-139.178.91.169:22-147.75.109.163:52900.service. Feb 9 12:53:53.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.91.169:22-147.75.109.163:52900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:53.524588 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:53:53.524638 kernel: audit: type=1130 audit(1707483233.497:596): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.91.169:22-147.75.109.163:52900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:53.635379 sshd[9396]: Accepted publickey for core from 147.75.109.163 port 52900 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:53:53.634000 audit[9396]: USER_ACCT pid=9396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:53.636685 sshd[9396]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:53:53.638913 systemd-logind[1541]: New session 39 of user core. Feb 9 12:53:53.639353 systemd[1]: Started session-39.scope. Feb 9 12:53:53.717195 sshd[9396]: pam_unix(sshd:session): session closed for user core Feb 9 12:53:53.718512 systemd[1]: sshd@37-139.178.91.169:22-147.75.109.163:52900.service: Deactivated successfully. Feb 9 12:53:53.719089 systemd-logind[1541]: Session 39 logged out. Waiting for processes to exit. Feb 9 12:53:53.719131 systemd[1]: session-39.scope: Deactivated successfully. Feb 9 12:53:53.719582 systemd-logind[1541]: Removed session 39. Feb 9 12:53:53.636000 audit[9396]: CRED_ACQ pid=9396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:53.817003 kernel: audit: type=1101 audit(1707483233.634:597): pid=9396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:53.817040 kernel: audit: type=1103 audit(1707483233.636:598): pid=9396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:53.817055 kernel: audit: type=1006 audit(1707483233.636:599): pid=9396 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=39 res=1 Feb 9 12:53:53.875475 kernel: audit: type=1300 audit(1707483233.636:599): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca5ca0c10 a2=3 a3=0 items=0 ppid=1 pid=9396 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:53.636000 audit[9396]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca5ca0c10 a2=3 a3=0 items=0 ppid=1 pid=9396 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:53.967457 kernel: audit: type=1327 audit(1707483233.636:599): proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:53.636000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:53.641000 audit[9396]: USER_START pid=9396 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:54.092248 kernel: audit: type=1105 audit(1707483233.641:600): pid=9396 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:54.092278 kernel: audit: type=1103 audit(1707483233.641:601): pid=9399 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:53.641000 audit[9399]: CRED_ACQ pid=9399 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:54.181391 kernel: audit: type=1106 audit(1707483233.717:602): pid=9396 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:53.717000 audit[9396]: USER_END pid=9396 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:54.276894 kernel: audit: type=1104 audit(1707483233.717:603): pid=9396 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:53.717000 audit[9396]: CRED_DISP pid=9396 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:53.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.91.169:22-147.75.109.163:52900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:58.723337 systemd[1]: Started sshd@38-139.178.91.169:22-147.75.109.163:56336.service. Feb 9 12:53:58.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.91.169:22-147.75.109.163:56336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:58.750441 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:53:58.750538 kernel: audit: type=1130 audit(1707483238.723:605): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.91.169:22-147.75.109.163:56336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:53:58.861000 audit[9487]: USER_ACCT pid=9487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:58.861682 sshd[9487]: Accepted publickey for core from 147.75.109.163 port 56336 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:53:58.863688 sshd[9487]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:53:58.866019 systemd-logind[1541]: New session 40 of user core. Feb 9 12:53:58.866465 systemd[1]: Started session-40.scope. Feb 9 12:53:58.944224 sshd[9487]: pam_unix(sshd:session): session closed for user core Feb 9 12:53:58.945609 systemd[1]: sshd@38-139.178.91.169:22-147.75.109.163:56336.service: Deactivated successfully. Feb 9 12:53:58.946193 systemd-logind[1541]: Session 40 logged out. Waiting for processes to exit. Feb 9 12:53:58.946225 systemd[1]: session-40.scope: Deactivated successfully. Feb 9 12:53:58.946699 systemd-logind[1541]: Removed session 40. Feb 9 12:53:58.863000 audit[9487]: CRED_ACQ pid=9487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:59.043410 kernel: audit: type=1101 audit(1707483238.861:606): pid=9487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:59.043451 kernel: audit: type=1103 audit(1707483238.863:607): pid=9487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:59.043472 kernel: audit: type=1006 audit(1707483238.863:608): pid=9487 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=40 res=1 Feb 9 12:53:59.101978 kernel: audit: type=1300 audit(1707483238.863:608): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc34cb1990 a2=3 a3=0 items=0 ppid=1 pid=9487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:58.863000 audit[9487]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc34cb1990 a2=3 a3=0 items=0 ppid=1 pid=9487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:53:58.863000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:59.224482 kernel: audit: type=1327 audit(1707483238.863:608): proctitle=737368643A20636F7265205B707269765D Feb 9 12:53:59.224512 kernel: audit: type=1105 audit(1707483238.868:609): pid=9487 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:58.868000 audit[9487]: USER_START pid=9487 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:58.868000 audit[9495]: CRED_ACQ pid=9495 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:59.319463 kernel: audit: type=1103 audit(1707483238.868:610): pid=9495 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:58.944000 audit[9487]: USER_END pid=9487 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:59.408432 kernel: audit: type=1106 audit(1707483238.944:611): pid=9487 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:58.944000 audit[9487]: CRED_DISP pid=9487 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:59.594984 kernel: audit: type=1104 audit(1707483238.944:612): pid=9487 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:53:58.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.91.169:22-147.75.109.163:56336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:03.948581 systemd[1]: Started sshd@39-139.178.91.169:22-147.75.109.163:56340.service. Feb 9 12:54:03.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.91.169:22-147.75.109.163:56340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:03.975088 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:54:03.975136 kernel: audit: type=1130 audit(1707483243.948:614): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.91.169:22-147.75.109.163:56340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:04.083000 audit[9518]: USER_ACCT pid=9518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:04.084301 sshd[9518]: Accepted publickey for core from 147.75.109.163 port 56340 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:54:04.085865 sshd[9518]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:54:04.088242 systemd-logind[1541]: New session 41 of user core. Feb 9 12:54:04.088719 systemd[1]: Started session-41.scope. Feb 9 12:54:04.166734 sshd[9518]: pam_unix(sshd:session): session closed for user core Feb 9 12:54:04.168096 systemd[1]: sshd@39-139.178.91.169:22-147.75.109.163:56340.service: Deactivated successfully. Feb 9 12:54:04.168681 systemd-logind[1541]: Session 41 logged out. Waiting for processes to exit. Feb 9 12:54:04.168721 systemd[1]: session-41.scope: Deactivated successfully. Feb 9 12:54:04.169165 systemd-logind[1541]: Removed session 41. Feb 9 12:54:04.085000 audit[9518]: CRED_ACQ pid=9518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:04.266045 kernel: audit: type=1101 audit(1707483244.083:615): pid=9518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:04.266081 kernel: audit: type=1103 audit(1707483244.085:616): pid=9518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:04.266099 kernel: audit: type=1006 audit(1707483244.085:617): pid=9518 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=41 res=1 Feb 9 12:54:04.324556 kernel: audit: type=1300 audit(1707483244.085:617): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdbdc7f70 a2=3 a3=0 items=0 ppid=1 pid=9518 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:04.085000 audit[9518]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdbdc7f70 a2=3 a3=0 items=0 ppid=1 pid=9518 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:04.416522 kernel: audit: type=1327 audit(1707483244.085:617): proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:04.085000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:04.446950 kernel: audit: type=1105 audit(1707483244.090:618): pid=9518 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:04.090000 audit[9518]: USER_START pid=9518 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:04.091000 audit[9521]: CRED_ACQ pid=9521 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:04.630594 kernel: audit: type=1103 audit(1707483244.091:619): pid=9521 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:04.630636 kernel: audit: type=1106 audit(1707483244.166:620): pid=9518 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:04.166000 audit[9518]: USER_END pid=9518 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:04.167000 audit[9518]: CRED_DISP pid=9518 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:04.726398 kernel: audit: type=1104 audit(1707483244.167:621): pid=9518 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:04.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.91.169:22-147.75.109.163:56340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:09.172468 systemd[1]: Started sshd@40-139.178.91.169:22-147.75.109.163:35686.service. Feb 9 12:54:09.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.91.169:22-147.75.109.163:35686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:09.199704 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:54:09.199799 kernel: audit: type=1130 audit(1707483249.172:623): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.91.169:22-147.75.109.163:35686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:09.310000 audit[9559]: USER_ACCT pid=9559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:09.310936 sshd[9559]: Accepted publickey for core from 147.75.109.163 port 35686 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:54:09.312581 sshd[9559]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:54:09.314991 systemd-logind[1541]: New session 42 of user core. Feb 9 12:54:09.315495 systemd[1]: Started session-42.scope. Feb 9 12:54:09.395862 sshd[9559]: pam_unix(sshd:session): session closed for user core Feb 9 12:54:09.397196 systemd[1]: sshd@40-139.178.91.169:22-147.75.109.163:35686.service: Deactivated successfully. Feb 9 12:54:09.397803 systemd-logind[1541]: Session 42 logged out. Waiting for processes to exit. Feb 9 12:54:09.397807 systemd[1]: session-42.scope: Deactivated successfully. Feb 9 12:54:09.398220 systemd-logind[1541]: Removed session 42. Feb 9 12:54:09.311000 audit[9559]: CRED_ACQ pid=9559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:09.494972 kernel: audit: type=1101 audit(1707483249.310:624): pid=9559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:09.495015 kernel: audit: type=1103 audit(1707483249.311:625): pid=9559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:09.495030 kernel: audit: type=1006 audit(1707483249.312:626): pid=9559 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=42 res=1 Feb 9 12:54:09.553467 kernel: audit: type=1300 audit(1707483249.312:626): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4f0f6b50 a2=3 a3=0 items=0 ppid=1 pid=9559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:09.312000 audit[9559]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4f0f6b50 a2=3 a3=0 items=0 ppid=1 pid=9559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:09.645434 kernel: audit: type=1327 audit(1707483249.312:626): proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:09.312000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:09.675867 kernel: audit: type=1105 audit(1707483249.317:627): pid=9559 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:09.317000 audit[9559]: USER_START pid=9559 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:09.317000 audit[9562]: CRED_ACQ pid=9562 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:09.859479 kernel: audit: type=1103 audit(1707483249.317:628): pid=9562 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:09.859512 kernel: audit: type=1106 audit(1707483249.396:629): pid=9559 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:09.396000 audit[9559]: USER_END pid=9559 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:09.954943 kernel: audit: type=1104 audit(1707483249.396:630): pid=9559 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:09.396000 audit[9559]: CRED_DISP pid=9559 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:09.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.91.169:22-147.75.109.163:35686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:14.402353 systemd[1]: Started sshd@41-139.178.91.169:22-147.75.109.163:60286.service. Feb 9 12:54:14.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.91.169:22-147.75.109.163:60286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:14.429539 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:54:14.429642 kernel: audit: type=1130 audit(1707483254.402:632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.91.169:22-147.75.109.163:60286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:14.540000 audit[9588]: USER_ACCT pid=9588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:14.541147 sshd[9588]: Accepted publickey for core from 147.75.109.163 port 60286 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:54:14.542557 sshd[9588]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:54:14.545088 systemd-logind[1541]: New session 43 of user core. Feb 9 12:54:14.545611 systemd[1]: Started session-43.scope. Feb 9 12:54:14.622240 sshd[9588]: pam_unix(sshd:session): session closed for user core Feb 9 12:54:14.623653 systemd[1]: sshd@41-139.178.91.169:22-147.75.109.163:60286.service: Deactivated successfully. Feb 9 12:54:14.624264 systemd-logind[1541]: Session 43 logged out. Waiting for processes to exit. Feb 9 12:54:14.624300 systemd[1]: session-43.scope: Deactivated successfully. Feb 9 12:54:14.624853 systemd-logind[1541]: Removed session 43. Feb 9 12:54:14.541000 audit[9588]: CRED_ACQ pid=9588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:14.722726 kernel: audit: type=1101 audit(1707483254.540:633): pid=9588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:14.722767 kernel: audit: type=1103 audit(1707483254.541:634): pid=9588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:14.722785 kernel: audit: type=1006 audit(1707483254.541:635): pid=9588 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=43 res=1 Feb 9 12:54:14.541000 audit[9588]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe09f6ed40 a2=3 a3=0 items=0 ppid=1 pid=9588 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:14.873074 kernel: audit: type=1300 audit(1707483254.541:635): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe09f6ed40 a2=3 a3=0 items=0 ppid=1 pid=9588 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:14.873104 kernel: audit: type=1327 audit(1707483254.541:635): proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:14.541000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:14.903454 kernel: audit: type=1105 audit(1707483254.547:636): pid=9588 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:14.547000 audit[9588]: USER_START pid=9588 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:14.997794 kernel: audit: type=1103 audit(1707483254.547:637): pid=9591 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:14.547000 audit[9591]: CRED_ACQ pid=9591 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:15.086902 kernel: audit: type=1106 audit(1707483254.622:638): pid=9588 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:14.622000 audit[9588]: USER_END pid=9588 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:15.182285 kernel: audit: type=1104 audit(1707483254.622:639): pid=9588 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:14.622000 audit[9588]: CRED_DISP pid=9588 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:14.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.91.169:22-147.75.109.163:60286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:18.003305 systemd[1]: Started sshd@42-139.178.91.169:22-218.92.0.43:58122.service. Feb 9 12:54:18.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.91.169:22-218.92.0.43:58122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:18.162825 sshd[9613]: Unable to negotiate with 218.92.0.43 port 58122: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 12:54:18.164695 systemd[1]: sshd@42-139.178.91.169:22-218.92.0.43:58122.service: Deactivated successfully. Feb 9 12:54:18.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.91.169:22-218.92.0.43:58122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:19.627977 systemd[1]: Started sshd@43-139.178.91.169:22-147.75.109.163:60292.service. Feb 9 12:54:19.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.91.169:22-147.75.109.163:60292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:19.654891 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 12:54:19.654968 kernel: audit: type=1130 audit(1707483259.627:643): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.91.169:22-147.75.109.163:60292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:19.764000 audit[9617]: USER_ACCT pid=9617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:19.765393 sshd[9617]: Accepted publickey for core from 147.75.109.163 port 60292 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:54:19.765980 sshd[9617]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:54:19.768380 systemd-logind[1541]: New session 44 of user core. Feb 9 12:54:19.768885 systemd[1]: Started session-44.scope. Feb 9 12:54:19.847054 sshd[9617]: pam_unix(sshd:session): session closed for user core Feb 9 12:54:19.848466 systemd[1]: sshd@43-139.178.91.169:22-147.75.109.163:60292.service: Deactivated successfully. Feb 9 12:54:19.849085 systemd[1]: session-44.scope: Deactivated successfully. Feb 9 12:54:19.849116 systemd-logind[1541]: Session 44 logged out. Waiting for processes to exit. Feb 9 12:54:19.849602 systemd-logind[1541]: Removed session 44. Feb 9 12:54:19.765000 audit[9617]: CRED_ACQ pid=9617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:19.947618 kernel: audit: type=1101 audit(1707483259.764:644): pid=9617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:19.947656 kernel: audit: type=1103 audit(1707483259.765:645): pid=9617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:19.947674 kernel: audit: type=1006 audit(1707483259.765:646): pid=9617 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=44 res=1 Feb 9 12:54:20.006086 kernel: audit: type=1300 audit(1707483259.765:646): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffed2eea60 a2=3 a3=0 items=0 ppid=1 pid=9617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:19.765000 audit[9617]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffed2eea60 a2=3 a3=0 items=0 ppid=1 pid=9617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:20.098009 kernel: audit: type=1327 audit(1707483259.765:646): proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:19.765000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:20.128477 kernel: audit: type=1105 audit(1707483259.770:647): pid=9617 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:19.770000 audit[9617]: USER_START pid=9617 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:20.222843 kernel: audit: type=1103 audit(1707483259.771:648): pid=9620 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:19.771000 audit[9620]: CRED_ACQ pid=9620 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:20.312050 kernel: audit: type=1106 audit(1707483259.847:649): pid=9617 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:19.847000 audit[9617]: USER_END pid=9617 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:20.407438 kernel: audit: type=1104 audit(1707483259.847:650): pid=9617 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:19.847000 audit[9617]: CRED_DISP pid=9617 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:19.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.91.169:22-147.75.109.163:60292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:24.853931 systemd[1]: Started sshd@44-139.178.91.169:22-147.75.109.163:35816.service. Feb 9 12:54:24.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.91.169:22-147.75.109.163:35816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:24.880710 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:54:24.880815 kernel: audit: type=1130 audit(1707483264.853:652): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.91.169:22-147.75.109.163:35816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:24.991000 audit[9684]: USER_ACCT pid=9684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:24.992407 sshd[9684]: Accepted publickey for core from 147.75.109.163 port 35816 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:54:24.993723 sshd[9684]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:54:24.996031 systemd-logind[1541]: New session 45 of user core. Feb 9 12:54:24.996527 systemd[1]: Started session-45.scope. Feb 9 12:54:25.073777 sshd[9684]: pam_unix(sshd:session): session closed for user core Feb 9 12:54:25.075193 systemd[1]: sshd@44-139.178.91.169:22-147.75.109.163:35816.service: Deactivated successfully. Feb 9 12:54:25.075792 systemd-logind[1541]: Session 45 logged out. Waiting for processes to exit. Feb 9 12:54:25.075839 systemd[1]: session-45.scope: Deactivated successfully. Feb 9 12:54:25.076289 systemd-logind[1541]: Removed session 45. Feb 9 12:54:24.993000 audit[9684]: CRED_ACQ pid=9684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:25.174074 kernel: audit: type=1101 audit(1707483264.991:653): pid=9684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:25.174137 kernel: audit: type=1103 audit(1707483264.993:654): pid=9684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:25.174158 kernel: audit: type=1006 audit(1707483264.993:655): pid=9684 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=45 res=1 Feb 9 12:54:25.232586 kernel: audit: type=1300 audit(1707483264.993:655): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfe30ac70 a2=3 a3=0 items=0 ppid=1 pid=9684 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:24.993000 audit[9684]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfe30ac70 a2=3 a3=0 items=0 ppid=1 pid=9684 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:25.324577 kernel: audit: type=1327 audit(1707483264.993:655): proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:24.993000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:25.354991 kernel: audit: type=1105 audit(1707483264.998:656): pid=9684 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:24.998000 audit[9684]: USER_START pid=9684 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:25.449476 kernel: audit: type=1103 audit(1707483264.998:657): pid=9687 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:24.998000 audit[9687]: CRED_ACQ pid=9687 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:25.538647 kernel: audit: type=1106 audit(1707483265.074:658): pid=9684 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:25.074000 audit[9684]: USER_END pid=9684 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:25.634079 kernel: audit: type=1104 audit(1707483265.074:659): pid=9684 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:25.074000 audit[9684]: CRED_DISP pid=9684 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:25.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.91.169:22-147.75.109.163:35816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:30.080371 systemd[1]: Started sshd@45-139.178.91.169:22-147.75.109.163:35820.service. Feb 9 12:54:30.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.91.169:22-147.75.109.163:35820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:30.107543 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:54:30.107634 kernel: audit: type=1130 audit(1707483270.080:661): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.91.169:22-147.75.109.163:35820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:30.218000 audit[9777]: USER_ACCT pid=9777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:30.218887 sshd[9777]: Accepted publickey for core from 147.75.109.163 port 35820 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:54:30.219672 sshd[9777]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:54:30.221972 systemd-logind[1541]: New session 46 of user core. Feb 9 12:54:30.222396 systemd[1]: Started session-46.scope. Feb 9 12:54:30.302996 sshd[9777]: pam_unix(sshd:session): session closed for user core Feb 9 12:54:30.304442 systemd[1]: sshd@45-139.178.91.169:22-147.75.109.163:35820.service: Deactivated successfully. Feb 9 12:54:30.305151 systemd-logind[1541]: Session 46 logged out. Waiting for processes to exit. Feb 9 12:54:30.305183 systemd[1]: session-46.scope: Deactivated successfully. Feb 9 12:54:30.305655 systemd-logind[1541]: Removed session 46. Feb 9 12:54:30.219000 audit[9777]: CRED_ACQ pid=9777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:30.402478 kernel: audit: type=1101 audit(1707483270.218:662): pid=9777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:30.402523 kernel: audit: type=1103 audit(1707483270.219:663): pid=9777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:30.402544 kernel: audit: type=1006 audit(1707483270.219:664): pid=9777 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=46 res=1 Feb 9 12:54:30.460995 kernel: audit: type=1300 audit(1707483270.219:664): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff33013e90 a2=3 a3=0 items=0 ppid=1 pid=9777 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:30.219000 audit[9777]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff33013e90 a2=3 a3=0 items=0 ppid=1 pid=9777 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:30.553006 kernel: audit: type=1327 audit(1707483270.219:664): proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:30.219000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:30.583474 kernel: audit: type=1105 audit(1707483270.224:665): pid=9777 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:30.224000 audit[9777]: USER_START pid=9777 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:30.677866 kernel: audit: type=1103 audit(1707483270.224:666): pid=9780 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:30.224000 audit[9780]: CRED_ACQ pid=9780 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:30.767168 kernel: audit: type=1106 audit(1707483270.303:667): pid=9777 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:30.303000 audit[9777]: USER_END pid=9777 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:30.862662 kernel: audit: type=1104 audit(1707483270.303:668): pid=9777 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:30.303000 audit[9777]: CRED_DISP pid=9777 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:30.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.91.169:22-147.75.109.163:35820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:35.308120 systemd[1]: Started sshd@46-139.178.91.169:22-147.75.109.163:32886.service. Feb 9 12:54:35.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.91.169:22-147.75.109.163:32886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:35.335143 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:54:35.335181 kernel: audit: type=1130 audit(1707483275.307:670): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.91.169:22-147.75.109.163:32886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:35.446397 sshd[9805]: Accepted publickey for core from 147.75.109.163 port 32886 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:54:35.445000 audit[9805]: USER_ACCT pid=9805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:35.447671 sshd[9805]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:54:35.450042 systemd-logind[1541]: New session 47 of user core. Feb 9 12:54:35.450494 systemd[1]: Started session-47.scope. Feb 9 12:54:35.529241 sshd[9805]: pam_unix(sshd:session): session closed for user core Feb 9 12:54:35.530677 systemd[1]: sshd@46-139.178.91.169:22-147.75.109.163:32886.service: Deactivated successfully. Feb 9 12:54:35.531243 systemd-logind[1541]: Session 47 logged out. Waiting for processes to exit. Feb 9 12:54:35.531257 systemd[1]: session-47.scope: Deactivated successfully. Feb 9 12:54:35.531769 systemd-logind[1541]: Removed session 47. Feb 9 12:54:35.447000 audit[9805]: CRED_ACQ pid=9805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:35.628268 kernel: audit: type=1101 audit(1707483275.445:671): pid=9805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:35.628311 kernel: audit: type=1103 audit(1707483275.447:672): pid=9805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:35.628330 kernel: audit: type=1006 audit(1707483275.447:673): pid=9805 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=47 res=1 Feb 9 12:54:35.686799 kernel: audit: type=1300 audit(1707483275.447:673): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd03554f60 a2=3 a3=0 items=0 ppid=1 pid=9805 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:35.447000 audit[9805]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd03554f60 a2=3 a3=0 items=0 ppid=1 pid=9805 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:35.778801 kernel: audit: type=1327 audit(1707483275.447:673): proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:35.447000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:35.809258 kernel: audit: type=1105 audit(1707483275.452:674): pid=9805 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:35.452000 audit[9805]: USER_START pid=9805 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:35.903740 kernel: audit: type=1103 audit(1707483275.452:675): pid=9808 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:35.452000 audit[9808]: CRED_ACQ pid=9808 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:35.992943 kernel: audit: type=1106 audit(1707483275.529:676): pid=9805 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:35.529000 audit[9805]: USER_END pid=9805 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:36.088394 kernel: audit: type=1104 audit(1707483275.529:677): pid=9805 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:35.529000 audit[9805]: CRED_DISP pid=9805 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:35.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.91.169:22-147.75.109.163:32886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:40.536170 systemd[1]: Started sshd@47-139.178.91.169:22-147.75.109.163:32890.service. Feb 9 12:54:40.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.91.169:22-147.75.109.163:32890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:40.563216 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:54:40.563287 kernel: audit: type=1130 audit(1707483280.535:679): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.91.169:22-147.75.109.163:32890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:40.673000 audit[9831]: USER_ACCT pid=9831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:40.673968 sshd[9831]: Accepted publickey for core from 147.75.109.163 port 32890 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:54:40.674651 sshd[9831]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:54:40.677018 systemd-logind[1541]: New session 48 of user core. Feb 9 12:54:40.677522 systemd[1]: Started session-48.scope. Feb 9 12:54:40.755828 sshd[9831]: pam_unix(sshd:session): session closed for user core Feb 9 12:54:40.757175 systemd[1]: sshd@47-139.178.91.169:22-147.75.109.163:32890.service: Deactivated successfully. Feb 9 12:54:40.757799 systemd[1]: session-48.scope: Deactivated successfully. Feb 9 12:54:40.757828 systemd-logind[1541]: Session 48 logged out. Waiting for processes to exit. Feb 9 12:54:40.758268 systemd-logind[1541]: Removed session 48. Feb 9 12:54:40.674000 audit[9831]: CRED_ACQ pid=9831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:40.856007 kernel: audit: type=1101 audit(1707483280.673:680): pid=9831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:40.856046 kernel: audit: type=1103 audit(1707483280.674:681): pid=9831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:40.856064 kernel: audit: type=1006 audit(1707483280.674:682): pid=9831 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=48 res=1 Feb 9 12:54:40.914569 kernel: audit: type=1300 audit(1707483280.674:682): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9ace2680 a2=3 a3=0 items=0 ppid=1 pid=9831 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:40.674000 audit[9831]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9ace2680 a2=3 a3=0 items=0 ppid=1 pid=9831 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:41.006566 kernel: audit: type=1327 audit(1707483280.674:682): proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:40.674000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:41.036997 kernel: audit: type=1105 audit(1707483280.679:683): pid=9831 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:40.679000 audit[9831]: USER_START pid=9831 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:40.679000 audit[9834]: CRED_ACQ pid=9834 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:41.220692 kernel: audit: type=1103 audit(1707483280.679:684): pid=9834 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:41.220730 kernel: audit: type=1106 audit(1707483280.756:685): pid=9831 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:40.756000 audit[9831]: USER_END pid=9831 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:41.316157 kernel: audit: type=1104 audit(1707483280.756:686): pid=9831 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:40.756000 audit[9831]: CRED_DISP pid=9831 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:40.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.91.169:22-147.75.109.163:32890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:45.762234 systemd[1]: Started sshd@48-139.178.91.169:22-147.75.109.163:49946.service. Feb 9 12:54:45.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.91.169:22-147.75.109.163:49946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:45.789170 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:54:45.789253 kernel: audit: type=1130 audit(1707483285.761:688): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.91.169:22-147.75.109.163:49946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:45.899000 audit[9858]: USER_ACCT pid=9858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:45.900229 sshd[9858]: Accepted publickey for core from 147.75.109.163 port 49946 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:54:45.903734 sshd[9858]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:54:45.906085 systemd-logind[1541]: New session 49 of user core. Feb 9 12:54:45.906692 systemd[1]: Started session-49.scope. Feb 9 12:54:45.984746 sshd[9858]: pam_unix(sshd:session): session closed for user core Feb 9 12:54:45.986101 systemd[1]: sshd@48-139.178.91.169:22-147.75.109.163:49946.service: Deactivated successfully. Feb 9 12:54:45.986738 systemd-logind[1541]: Session 49 logged out. Waiting for processes to exit. Feb 9 12:54:45.986746 systemd[1]: session-49.scope: Deactivated successfully. Feb 9 12:54:45.987244 systemd-logind[1541]: Removed session 49. Feb 9 12:54:45.903000 audit[9858]: CRED_ACQ pid=9858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:46.081913 kernel: audit: type=1101 audit(1707483285.899:689): pid=9858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:46.081953 kernel: audit: type=1103 audit(1707483285.903:690): pid=9858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:46.081969 kernel: audit: type=1006 audit(1707483285.903:691): pid=9858 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=49 res=1 Feb 9 12:54:46.140469 kernel: audit: type=1300 audit(1707483285.903:691): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0ea922b0 a2=3 a3=0 items=0 ppid=1 pid=9858 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:45.903000 audit[9858]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0ea922b0 a2=3 a3=0 items=0 ppid=1 pid=9858 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:46.232381 kernel: audit: type=1327 audit(1707483285.903:691): proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:45.903000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:46.262800 kernel: audit: type=1105 audit(1707483285.908:692): pid=9858 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:45.908000 audit[9858]: USER_START pid=9858 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:46.357178 kernel: audit: type=1103 audit(1707483285.909:693): pid=9861 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:45.909000 audit[9861]: CRED_ACQ pid=9861 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:46.446266 kernel: audit: type=1106 audit(1707483285.985:694): pid=9858 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:45.985000 audit[9858]: USER_END pid=9858 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:46.541756 kernel: audit: type=1104 audit(1707483285.985:695): pid=9858 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:45.985000 audit[9858]: CRED_DISP pid=9858 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:45.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.91.169:22-147.75.109.163:49946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:50.991746 systemd[1]: Started sshd@49-139.178.91.169:22-147.75.109.163:49958.service. Feb 9 12:54:50.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.91.169:22-147.75.109.163:49958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:51.018891 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:54:51.018980 kernel: audit: type=1130 audit(1707483290.991:697): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.91.169:22-147.75.109.163:49958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:51.129000 audit[9903]: USER_ACCT pid=9903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:51.130546 sshd[9903]: Accepted publickey for core from 147.75.109.163 port 49958 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:54:51.131684 sshd[9903]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:54:51.134039 systemd-logind[1541]: New session 50 of user core. Feb 9 12:54:51.134503 systemd[1]: Started session-50.scope. Feb 9 12:54:51.214146 sshd[9903]: pam_unix(sshd:session): session closed for user core Feb 9 12:54:51.215548 systemd[1]: sshd@49-139.178.91.169:22-147.75.109.163:49958.service: Deactivated successfully. Feb 9 12:54:51.216163 systemd-logind[1541]: Session 50 logged out. Waiting for processes to exit. Feb 9 12:54:51.216204 systemd[1]: session-50.scope: Deactivated successfully. Feb 9 12:54:51.216699 systemd-logind[1541]: Removed session 50. Feb 9 12:54:51.131000 audit[9903]: CRED_ACQ pid=9903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:51.312109 kernel: audit: type=1101 audit(1707483291.129:698): pid=9903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:51.312145 kernel: audit: type=1103 audit(1707483291.131:699): pid=9903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:51.312166 kernel: audit: type=1006 audit(1707483291.131:700): pid=9903 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=50 res=1 Feb 9 12:54:51.370604 kernel: audit: type=1300 audit(1707483291.131:700): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe30564d30 a2=3 a3=0 items=0 ppid=1 pid=9903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:51.131000 audit[9903]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe30564d30 a2=3 a3=0 items=0 ppid=1 pid=9903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:51.131000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:51.492880 kernel: audit: type=1327 audit(1707483291.131:700): proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:51.492909 kernel: audit: type=1105 audit(1707483291.136:701): pid=9903 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:51.136000 audit[9903]: USER_START pid=9903 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:51.587351 kernel: audit: type=1103 audit(1707483291.136:702): pid=9906 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:51.136000 audit[9906]: CRED_ACQ pid=9906 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:51.676477 kernel: audit: type=1106 audit(1707483291.214:703): pid=9903 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:51.214000 audit[9903]: USER_END pid=9903 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:51.771840 kernel: audit: type=1104 audit(1707483291.214:704): pid=9903 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:51.214000 audit[9903]: CRED_DISP pid=9903 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:51.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.91.169:22-147.75.109.163:49958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:56.220937 systemd[1]: Started sshd@50-139.178.91.169:22-147.75.109.163:55692.service. Feb 9 12:54:56.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.91.169:22-147.75.109.163:55692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:56.247874 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:54:56.247945 kernel: audit: type=1130 audit(1707483296.220:706): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.91.169:22-147.75.109.163:55692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:54:56.358000 audit[9960]: USER_ACCT pid=9960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:56.358771 sshd[9960]: Accepted publickey for core from 147.75.109.163 port 55692 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:54:56.359926 sshd[9960]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:54:56.362309 systemd-logind[1541]: New session 51 of user core. Feb 9 12:54:56.362787 systemd[1]: Started session-51.scope. Feb 9 12:54:56.441455 sshd[9960]: pam_unix(sshd:session): session closed for user core Feb 9 12:54:56.442756 systemd[1]: sshd@50-139.178.91.169:22-147.75.109.163:55692.service: Deactivated successfully. Feb 9 12:54:56.443335 systemd-logind[1541]: Session 51 logged out. Waiting for processes to exit. Feb 9 12:54:56.443370 systemd[1]: session-51.scope: Deactivated successfully. Feb 9 12:54:56.443819 systemd-logind[1541]: Removed session 51. Feb 9 12:54:56.359000 audit[9960]: CRED_ACQ pid=9960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:56.541134 kernel: audit: type=1101 audit(1707483296.358:707): pid=9960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:56.541174 kernel: audit: type=1103 audit(1707483296.359:708): pid=9960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:56.541191 kernel: audit: type=1006 audit(1707483296.359:709): pid=9960 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=51 res=1 Feb 9 12:54:56.599649 kernel: audit: type=1300 audit(1707483296.359:709): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe3119250 a2=3 a3=0 items=0 ppid=1 pid=9960 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:56.359000 audit[9960]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe3119250 a2=3 a3=0 items=0 ppid=1 pid=9960 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:54:56.691568 kernel: audit: type=1327 audit(1707483296.359:709): proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:56.359000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:54:56.722038 kernel: audit: type=1105 audit(1707483296.364:710): pid=9960 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:56.364000 audit[9960]: USER_START pid=9960 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:56.816483 kernel: audit: type=1103 audit(1707483296.364:711): pid=9963 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:56.364000 audit[9963]: CRED_ACQ pid=9963 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:56.905588 kernel: audit: type=1106 audit(1707483296.441:712): pid=9960 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:56.441000 audit[9960]: USER_END pid=9960 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:57.000935 kernel: audit: type=1104 audit(1707483296.441:713): pid=9960 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:56.441000 audit[9960]: CRED_DISP pid=9960 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:54:56.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.91.169:22-147.75.109.163:55692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:01.447897 systemd[1]: Started sshd@51-139.178.91.169:22-147.75.109.163:55704.service. Feb 9 12:55:01.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.91.169:22-147.75.109.163:55704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:01.475204 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:55:01.475265 kernel: audit: type=1130 audit(1707483301.447:715): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.91.169:22-147.75.109.163:55704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:01.584000 audit[10027]: USER_ACCT pid=10027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:01.585507 sshd[10027]: Accepted publickey for core from 147.75.109.163 port 55704 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:01.586688 sshd[10027]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:01.589008 systemd-logind[1541]: New session 52 of user core. Feb 9 12:55:01.589405 systemd[1]: Started session-52.scope. Feb 9 12:55:01.668084 sshd[10027]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:01.669427 systemd[1]: sshd@51-139.178.91.169:22-147.75.109.163:55704.service: Deactivated successfully. Feb 9 12:55:01.670042 systemd-logind[1541]: Session 52 logged out. Waiting for processes to exit. Feb 9 12:55:01.670048 systemd[1]: session-52.scope: Deactivated successfully. Feb 9 12:55:01.670464 systemd-logind[1541]: Removed session 52. Feb 9 12:55:01.586000 audit[10027]: CRED_ACQ pid=10027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:01.767477 kernel: audit: type=1101 audit(1707483301.584:716): pid=10027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:01.767518 kernel: audit: type=1103 audit(1707483301.586:717): pid=10027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:01.767539 kernel: audit: type=1006 audit(1707483301.586:718): pid=10027 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=52 res=1 Feb 9 12:55:01.586000 audit[10027]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6ce8ed30 a2=3 a3=0 items=0 ppid=1 pid=10027 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:01.918234 kernel: audit: type=1300 audit(1707483301.586:718): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6ce8ed30 a2=3 a3=0 items=0 ppid=1 pid=10027 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:01.918268 kernel: audit: type=1327 audit(1707483301.586:718): proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:01.586000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:01.948661 kernel: audit: type=1105 audit(1707483301.591:719): pid=10027 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:01.591000 audit[10027]: USER_START pid=10027 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:02.043164 kernel: audit: type=1103 audit(1707483301.591:720): pid=10030 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:01.591000 audit[10030]: CRED_ACQ pid=10030 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:01.668000 audit[10027]: USER_END pid=10027 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:02.227947 kernel: audit: type=1106 audit(1707483301.668:721): pid=10027 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:02.227982 kernel: audit: type=1104 audit(1707483301.668:722): pid=10027 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:01.668000 audit[10027]: CRED_DISP pid=10027 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:01.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.91.169:22-147.75.109.163:55704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:06.673904 systemd[1]: Started sshd@52-139.178.91.169:22-147.75.109.163:60476.service. Feb 9 12:55:06.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.91.169:22-147.75.109.163:60476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:06.701092 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:55:06.701146 kernel: audit: type=1130 audit(1707483306.673:724): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.91.169:22-147.75.109.163:60476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:06.817546 sshd[10055]: Accepted publickey for core from 147.75.109.163 port 60476 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:06.817000 audit[10055]: USER_ACCT pid=10055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:06.819674 sshd[10055]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:06.821956 systemd-logind[1541]: New session 53 of user core. Feb 9 12:55:06.822459 systemd[1]: Started session-53.scope. Feb 9 12:55:06.903398 sshd[10055]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:06.904947 systemd[1]: sshd@52-139.178.91.169:22-147.75.109.163:60476.service: Deactivated successfully. Feb 9 12:55:06.905706 systemd-logind[1541]: Session 53 logged out. Waiting for processes to exit. Feb 9 12:55:06.905712 systemd[1]: session-53.scope: Deactivated successfully. Feb 9 12:55:06.906226 systemd-logind[1541]: Removed session 53. Feb 9 12:55:06.819000 audit[10055]: CRED_ACQ pid=10055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:07.001562 kernel: audit: type=1101 audit(1707483306.817:725): pid=10055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:07.001597 kernel: audit: type=1103 audit(1707483306.819:726): pid=10055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:07.001614 kernel: audit: type=1006 audit(1707483306.819:727): pid=10055 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=53 res=1 Feb 9 12:55:07.060113 kernel: audit: type=1300 audit(1707483306.819:727): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdeb291750 a2=3 a3=0 items=0 ppid=1 pid=10055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:06.819000 audit[10055]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdeb291750 a2=3 a3=0 items=0 ppid=1 pid=10055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:07.152074 kernel: audit: type=1327 audit(1707483306.819:727): proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:06.819000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:07.182472 kernel: audit: type=1105 audit(1707483306.824:728): pid=10055 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:06.824000 audit[10055]: USER_START pid=10055 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:07.276844 kernel: audit: type=1103 audit(1707483306.824:729): pid=10058 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:06.824000 audit[10058]: CRED_ACQ pid=10058 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:06.902000 audit[10055]: USER_END pid=10055 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:07.461311 kernel: audit: type=1106 audit(1707483306.902:730): pid=10055 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:07.461344 kernel: audit: type=1104 audit(1707483306.902:731): pid=10055 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:06.902000 audit[10055]: CRED_DISP pid=10055 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:06.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.91.169:22-147.75.109.163:60476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:08.610668 systemd[1]: Started sshd@53-139.178.91.169:22-59.152.58.59:38646.service. Feb 9 12:55:08.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.91.169:22-59.152.58.59:38646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:10.728156 sshd[10081]: Invalid user admin from 59.152.58.59 port 38646 Feb 9 12:55:10.734119 sshd[10081]: pam_faillock(sshd:auth): User unknown Feb 9 12:55:10.735315 sshd[10081]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:55:10.735445 sshd[10081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.58.59 Feb 9 12:55:10.736337 sshd[10081]: pam_faillock(sshd:auth): User unknown Feb 9 12:55:10.735000 audit[10081]: USER_AUTH pid=10081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=59.152.58.59 addr=59.152.58.59 terminal=ssh res=failed' Feb 9 12:55:11.909586 systemd[1]: Started sshd@54-139.178.91.169:22-147.75.109.163:60490.service. Feb 9 12:55:11.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.91.169:22-147.75.109.163:60490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:11.936611 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 12:55:11.936671 kernel: audit: type=1130 audit(1707483311.908:735): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.91.169:22-147.75.109.163:60490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:11.957554 sshd[10083]: Accepted publickey for core from 147.75.109.163 port 60490 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:11.958709 sshd[10083]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:11.961080 systemd-logind[1541]: New session 54 of user core. Feb 9 12:55:11.961618 systemd[1]: Started session-54.scope. Feb 9 12:55:11.956000 audit[10083]: USER_ACCT pid=10083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:12.040616 sshd[10083]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:12.042051 systemd[1]: sshd@54-139.178.91.169:22-147.75.109.163:60490.service: Deactivated successfully. Feb 9 12:55:12.042714 systemd[1]: session-54.scope: Deactivated successfully. Feb 9 12:55:12.042760 systemd-logind[1541]: Session 54 logged out. Waiting for processes to exit. Feb 9 12:55:12.043276 systemd-logind[1541]: Removed session 54. Feb 9 12:55:12.117476 kernel: audit: type=1101 audit(1707483311.956:736): pid=10083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:12.117513 kernel: audit: type=1103 audit(1707483311.957:737): pid=10083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:11.957000 audit[10083]: CRED_ACQ pid=10083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:12.207904 kernel: audit: type=1006 audit(1707483311.957:738): pid=10083 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=54 res=1 Feb 9 12:55:12.266460 kernel: audit: type=1300 audit(1707483311.957:738): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe071bc220 a2=3 a3=0 items=0 ppid=1 pid=10083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:11.957000 audit[10083]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe071bc220 a2=3 a3=0 items=0 ppid=1 pid=10083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:12.358340 kernel: audit: type=1327 audit(1707483311.957:738): proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:11.957000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:12.388687 kernel: audit: type=1105 audit(1707483311.962:739): pid=10083 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:11.962000 audit[10083]: USER_START pid=10083 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:12.483077 kernel: audit: type=1103 audit(1707483311.963:740): pid=10086 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:11.963000 audit[10086]: CRED_ACQ pid=10086 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:12.572224 kernel: audit: type=1106 audit(1707483312.039:741): pid=10083 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:12.039000 audit[10083]: USER_END pid=10083 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:12.667608 kernel: audit: type=1104 audit(1707483312.039:742): pid=10083 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:12.039000 audit[10083]: CRED_DISP pid=10083 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:12.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.91.169:22-147.75.109.163:60490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:12.857751 sshd[10081]: Failed password for invalid user admin from 59.152.58.59 port 38646 ssh2 Feb 9 12:55:14.926471 sshd[10081]: Connection closed by invalid user admin 59.152.58.59 port 38646 [preauth] Feb 9 12:55:14.929103 systemd[1]: sshd@53-139.178.91.169:22-59.152.58.59:38646.service: Deactivated successfully. Feb 9 12:55:14.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.91.169:22-59.152.58.59:38646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:15.041836 systemd[1]: Started sshd@55-139.178.91.169:22-24.214.247.230:48860.service. Feb 9 12:55:15.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.91.169:22-24.214.247.230:48860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:16.324912 sshd[10114]: Invalid user admin from 24.214.247.230 port 48860 Feb 9 12:55:16.331099 sshd[10114]: pam_faillock(sshd:auth): User unknown Feb 9 12:55:16.332105 sshd[10114]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:55:16.332195 sshd[10114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.214.247.230 Feb 9 12:55:16.333085 sshd[10114]: pam_faillock(sshd:auth): User unknown Feb 9 12:55:16.331000 audit[10114]: USER_AUTH pid=10114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=24.214.247.230 addr=24.214.247.230 terminal=ssh res=failed' Feb 9 12:55:17.045963 systemd[1]: Started sshd@56-139.178.91.169:22-147.75.109.163:59906.service. Feb 9 12:55:17.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.91.169:22-147.75.109.163:59906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:17.073254 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 9 12:55:17.073289 kernel: audit: type=1130 audit(1707483317.044:747): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.91.169:22-147.75.109.163:59906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:17.182000 audit[10117]: USER_ACCT pid=10117 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:17.183630 sshd[10117]: Accepted publickey for core from 147.75.109.163 port 59906 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:17.185189 sshd[10117]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:17.187725 systemd-logind[1541]: New session 55 of user core. Feb 9 12:55:17.188210 systemd[1]: Started session-55.scope. Feb 9 12:55:17.183000 audit[10117]: CRED_ACQ pid=10117 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:17.365295 kernel: audit: type=1101 audit(1707483317.182:748): pid=10117 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:17.365338 kernel: audit: type=1103 audit(1707483317.183:749): pid=10117 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:17.365355 kernel: audit: type=1006 audit(1707483317.183:750): pid=10117 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=55 res=1 Feb 9 12:55:17.423798 kernel: audit: type=1300 audit(1707483317.183:750): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4353c620 a2=3 a3=0 items=0 ppid=1 pid=10117 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:17.183000 audit[10117]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4353c620 a2=3 a3=0 items=0 ppid=1 pid=10117 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:17.183000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:17.516009 sshd[10117]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:17.516436 kernel: audit: type=1327 audit(1707483317.183:750): proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:17.517474 systemd[1]: sshd@56-139.178.91.169:22-147.75.109.163:59906.service: Deactivated successfully. Feb 9 12:55:17.518123 systemd[1]: session-55.scope: Deactivated successfully. Feb 9 12:55:17.518152 systemd-logind[1541]: Session 55 logged out. Waiting for processes to exit. Feb 9 12:55:17.518625 systemd-logind[1541]: Removed session 55. Feb 9 12:55:17.188000 audit[10117]: USER_START pid=10117 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:17.640548 kernel: audit: type=1105 audit(1707483317.188:751): pid=10117 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:17.640580 kernel: audit: type=1103 audit(1707483317.189:752): pid=10120 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:17.189000 audit[10120]: CRED_ACQ pid=10120 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:17.729637 kernel: audit: type=1106 audit(1707483317.515:753): pid=10117 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:17.515000 audit[10117]: USER_END pid=10117 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:17.515000 audit[10117]: CRED_DISP pid=10117 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:17.914301 kernel: audit: type=1104 audit(1707483317.515:754): pid=10117 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:17.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.91.169:22-147.75.109.163:59906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:18.610572 sshd[10114]: Failed password for invalid user admin from 24.214.247.230 port 48860 ssh2 Feb 9 12:55:20.523047 sshd[10114]: Connection closed by invalid user admin 24.214.247.230 port 48860 [preauth] Feb 9 12:55:20.524604 systemd[1]: sshd@55-139.178.91.169:22-24.214.247.230:48860.service: Deactivated successfully. Feb 9 12:55:20.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.91.169:22-24.214.247.230:48860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:22.464601 systemd[1]: Started sshd@57-139.178.91.169:22-147.75.109.163:59910.service. Feb 9 12:55:22.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.91.169:22-147.75.109.163:59910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:22.491662 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 12:55:22.491731 kernel: audit: type=1130 audit(1707483322.463:757): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.91.169:22-147.75.109.163:59910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:22.599000 audit[10186]: USER_ACCT pid=10186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:22.601250 sshd[10186]: Accepted publickey for core from 147.75.109.163 port 59910 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:22.602713 sshd[10186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:22.605129 systemd-logind[1541]: New session 56 of user core. Feb 9 12:55:22.605660 systemd[1]: Started session-56.scope. Feb 9 12:55:22.687565 sshd[10186]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:22.689079 systemd[1]: sshd@57-139.178.91.169:22-147.75.109.163:59910.service: Deactivated successfully. Feb 9 12:55:22.689804 systemd[1]: session-56.scope: Deactivated successfully. Feb 9 12:55:22.689840 systemd-logind[1541]: Session 56 logged out. Waiting for processes to exit. Feb 9 12:55:22.690350 systemd-logind[1541]: Removed session 56. Feb 9 12:55:22.601000 audit[10186]: CRED_ACQ pid=10186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:22.784772 kernel: audit: type=1101 audit(1707483322.599:758): pid=10186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:22.784802 kernel: audit: type=1103 audit(1707483322.601:759): pid=10186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:22.784830 kernel: audit: type=1006 audit(1707483322.601:760): pid=10186 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=56 res=1 Feb 9 12:55:22.843477 kernel: audit: type=1300 audit(1707483322.601:760): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0dd06d00 a2=3 a3=0 items=0 ppid=1 pid=10186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:22.601000 audit[10186]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0dd06d00 a2=3 a3=0 items=0 ppid=1 pid=10186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:22.935347 kernel: audit: type=1327 audit(1707483322.601:760): proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:22.601000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:22.965702 kernel: audit: type=1105 audit(1707483322.606:761): pid=10186 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:22.606000 audit[10186]: USER_START pid=10186 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:23.060051 kernel: audit: type=1103 audit(1707483322.607:762): pid=10189 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:22.607000 audit[10189]: CRED_ACQ pid=10189 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:23.149133 kernel: audit: type=1106 audit(1707483322.686:763): pid=10186 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:22.686000 audit[10186]: USER_END pid=10186 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:23.244474 kernel: audit: type=1104 audit(1707483322.686:764): pid=10186 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:22.686000 audit[10186]: CRED_DISP pid=10186 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:22.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.91.169:22-147.75.109.163:59910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:27.694271 systemd[1]: Started sshd@58-139.178.91.169:22-147.75.109.163:32904.service. Feb 9 12:55:27.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.91.169:22-147.75.109.163:32904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:27.721244 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:55:27.721285 kernel: audit: type=1130 audit(1707483327.692:766): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.91.169:22-147.75.109.163:32904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:27.831000 audit[10242]: USER_ACCT pid=10242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:27.832905 sshd[10242]: Accepted publickey for core from 147.75.109.163 port 32904 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:27.834706 sshd[10242]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:27.837072 systemd-logind[1541]: New session 57 of user core. Feb 9 12:55:27.837612 systemd[1]: Started session-57.scope. Feb 9 12:55:27.914726 sshd[10242]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:27.916108 systemd[1]: sshd@58-139.178.91.169:22-147.75.109.163:32904.service: Deactivated successfully. Feb 9 12:55:27.916789 systemd[1]: session-57.scope: Deactivated successfully. Feb 9 12:55:27.916794 systemd-logind[1541]: Session 57 logged out. Waiting for processes to exit. Feb 9 12:55:27.917290 systemd-logind[1541]: Removed session 57. Feb 9 12:55:27.833000 audit[10242]: CRED_ACQ pid=10242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:28.014598 kernel: audit: type=1101 audit(1707483327.831:767): pid=10242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:28.014638 kernel: audit: type=1103 audit(1707483327.833:768): pid=10242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:28.014656 kernel: audit: type=1006 audit(1707483327.833:769): pid=10242 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=57 res=1 Feb 9 12:55:27.833000 audit[10242]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8842f330 a2=3 a3=0 items=0 ppid=1 pid=10242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:28.165176 kernel: audit: type=1300 audit(1707483327.833:769): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8842f330 a2=3 a3=0 items=0 ppid=1 pid=10242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:28.165239 kernel: audit: type=1327 audit(1707483327.833:769): proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:27.833000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:28.195576 kernel: audit: type=1105 audit(1707483327.838:770): pid=10242 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:27.838000 audit[10242]: USER_START pid=10242 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:28.290021 kernel: audit: type=1103 audit(1707483327.838:771): pid=10245 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:27.838000 audit[10245]: CRED_ACQ pid=10245 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:28.379192 kernel: audit: type=1106 audit(1707483327.913:772): pid=10242 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:27.913000 audit[10242]: USER_END pid=10242 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:28.474638 kernel: audit: type=1104 audit(1707483327.914:773): pid=10242 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:27.914000 audit[10242]: CRED_DISP pid=10242 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:27.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.91.169:22-147.75.109.163:32904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:32.921474 systemd[1]: Started sshd@59-139.178.91.169:22-147.75.109.163:32918.service. Feb 9 12:55:32.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.91.169:22-147.75.109.163:32918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:32.948345 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:55:32.948396 kernel: audit: type=1130 audit(1707483332.920:775): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.91.169:22-147.75.109.163:32918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:33.058000 audit[10309]: USER_ACCT pid=10309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:33.059842 sshd[10309]: Accepted publickey for core from 147.75.109.163 port 32918 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:33.060563 sshd[10309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:33.062991 systemd-logind[1541]: New session 58 of user core. Feb 9 12:55:33.063533 systemd[1]: Started session-58.scope. Feb 9 12:55:33.143266 sshd[10309]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:33.144727 systemd[1]: sshd@59-139.178.91.169:22-147.75.109.163:32918.service: Deactivated successfully. Feb 9 12:55:33.145322 systemd-logind[1541]: Session 58 logged out. Waiting for processes to exit. Feb 9 12:55:33.145336 systemd[1]: session-58.scope: Deactivated successfully. Feb 9 12:55:33.145952 systemd-logind[1541]: Removed session 58. Feb 9 12:55:33.058000 audit[10309]: CRED_ACQ pid=10309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:33.242233 kernel: audit: type=1101 audit(1707483333.058:776): pid=10309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:33.242274 kernel: audit: type=1103 audit(1707483333.058:777): pid=10309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:33.242292 kernel: audit: type=1006 audit(1707483333.059:778): pid=10309 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=58 res=1 Feb 9 12:55:33.300792 kernel: audit: type=1300 audit(1707483333.059:778): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd12e0fb0 a2=3 a3=0 items=0 ppid=1 pid=10309 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:33.059000 audit[10309]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd12e0fb0 a2=3 a3=0 items=0 ppid=1 pid=10309 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:33.392720 kernel: audit: type=1327 audit(1707483333.059:778): proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:33.059000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:33.423125 kernel: audit: type=1105 audit(1707483333.064:779): pid=10309 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:33.064000 audit[10309]: USER_START pid=10309 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:33.065000 audit[10312]: CRED_ACQ pid=10312 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:33.606659 kernel: audit: type=1103 audit(1707483333.065:780): pid=10312 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:33.606693 kernel: audit: type=1106 audit(1707483333.142:781): pid=10309 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:33.142000 audit[10309]: USER_END pid=10309 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:33.702062 kernel: audit: type=1104 audit(1707483333.142:782): pid=10309 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:33.142000 audit[10309]: CRED_DISP pid=10309 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:33.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.91.169:22-147.75.109.163:32918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:38.150084 systemd[1]: Started sshd@60-139.178.91.169:22-147.75.109.163:36362.service. Feb 9 12:55:38.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.91.169:22-147.75.109.163:36362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:38.177098 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:55:38.177202 kernel: audit: type=1130 audit(1707483338.148:784): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.91.169:22-147.75.109.163:36362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:38.286000 audit[10336]: USER_ACCT pid=10336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.288271 sshd[10336]: Accepted publickey for core from 147.75.109.163 port 36362 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:38.289871 sshd[10336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:38.292326 systemd-logind[1541]: New session 59 of user core. Feb 9 12:55:38.292946 systemd[1]: Started session-59.scope. Feb 9 12:55:38.371830 sshd[10336]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:38.373552 systemd[1]: Started sshd@61-139.178.91.169:22-147.75.109.163:36374.service. Feb 9 12:55:38.373870 systemd[1]: sshd@60-139.178.91.169:22-147.75.109.163:36362.service: Deactivated successfully. Feb 9 12:55:38.374339 systemd-logind[1541]: Session 59 logged out. Waiting for processes to exit. Feb 9 12:55:38.374370 systemd[1]: session-59.scope: Deactivated successfully. Feb 9 12:55:38.374883 systemd-logind[1541]: Removed session 59. Feb 9 12:55:38.288000 audit[10336]: CRED_ACQ pid=10336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.469991 kernel: audit: type=1101 audit(1707483338.286:785): pid=10336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.470026 kernel: audit: type=1103 audit(1707483338.288:786): pid=10336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.470043 kernel: audit: type=1006 audit(1707483338.288:787): pid=10336 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=59 res=1 Feb 9 12:55:38.288000 audit[10336]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6e2396e0 a2=3 a3=0 items=0 ppid=1 pid=10336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:38.549382 sshd[10361]: Accepted publickey for core from 147.75.109.163 port 36374 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:38.551115 sshd[10361]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:38.553446 systemd-logind[1541]: New session 60 of user core. Feb 9 12:55:38.553935 systemd[1]: Started session-60.scope. Feb 9 12:55:38.620444 kernel: audit: type=1300 audit(1707483338.288:787): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6e2396e0 a2=3 a3=0 items=0 ppid=1 pid=10336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:38.620503 kernel: audit: type=1327 audit(1707483338.288:787): proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:38.288000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:38.650822 kernel: audit: type=1105 audit(1707483338.293:788): pid=10336 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.293000 audit[10336]: USER_START pid=10336 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.745226 kernel: audit: type=1103 audit(1707483338.294:789): pid=10339 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.294000 audit[10339]: CRED_ACQ pid=10339 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.834365 kernel: audit: type=1106 audit(1707483338.371:790): pid=10336 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.371000 audit[10336]: USER_END pid=10336 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.929787 kernel: audit: type=1104 audit(1707483338.371:791): pid=10336 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.371000 audit[10336]: CRED_DISP pid=10336 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.91.169:22-147.75.109.163:36374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:38.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.91.169:22-147.75.109.163:36362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:38.547000 audit[10361]: USER_ACCT pid=10361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.549000 audit[10361]: CRED_ACQ pid=10361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.549000 audit[10361]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe0e56180 a2=3 a3=0 items=0 ppid=1 pid=10361 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:38.549000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:38.554000 audit[10361]: USER_START pid=10361 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:38.555000 audit[10365]: CRED_ACQ pid=10365 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:39.637561 sshd[10361]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:39.636000 audit[10361]: USER_END pid=10361 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:39.636000 audit[10361]: CRED_DISP pid=10361 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:39.639500 systemd[1]: Started sshd@62-139.178.91.169:22-147.75.109.163:36390.service. Feb 9 12:55:39.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.91.169:22-147.75.109.163:36390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:39.639773 systemd[1]: sshd@61-139.178.91.169:22-147.75.109.163:36374.service: Deactivated successfully. Feb 9 12:55:39.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.91.169:22-147.75.109.163:36374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:39.640379 systemd-logind[1541]: Session 60 logged out. Waiting for processes to exit. Feb 9 12:55:39.640425 systemd[1]: session-60.scope: Deactivated successfully. Feb 9 12:55:39.640887 systemd-logind[1541]: Removed session 60. Feb 9 12:55:39.666000 audit[10384]: USER_ACCT pid=10384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:39.668003 sshd[10384]: Accepted publickey for core from 147.75.109.163 port 36390 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:39.667000 audit[10384]: CRED_ACQ pid=10384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:39.667000 audit[10384]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7f115c80 a2=3 a3=0 items=0 ppid=1 pid=10384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:39.667000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:39.668867 sshd[10384]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:39.672066 systemd-logind[1541]: New session 61 of user core. Feb 9 12:55:39.672614 systemd[1]: Started session-61.scope. Feb 9 12:55:39.674000 audit[10384]: USER_START pid=10384 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:39.674000 audit[10388]: CRED_ACQ pid=10388 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:40.932730 sshd[10384]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:40.932000 audit[10384]: USER_END pid=10384 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:40.932000 audit[10384]: CRED_DISP pid=10384 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:40.934882 systemd[1]: Started sshd@63-139.178.91.169:22-147.75.109.163:36406.service. Feb 9 12:55:40.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.91.169:22-147.75.109.163:36406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:40.935347 systemd[1]: sshd@62-139.178.91.169:22-147.75.109.163:36390.service: Deactivated successfully. Feb 9 12:55:40.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.91.169:22-147.75.109.163:36390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:40.936237 systemd-logind[1541]: Session 61 logged out. Waiting for processes to exit. Feb 9 12:55:40.936282 systemd[1]: session-61.scope: Deactivated successfully. Feb 9 12:55:40.937001 systemd-logind[1541]: Removed session 61. Feb 9 12:55:40.946000 audit[10441]: NETFILTER_CFG table=filter:139 family=2 entries=18 op=nft_register_rule pid=10441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:55:40.946000 audit[10441]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffc06579fb0 a2=0 a3=7ffc06579f9c items=0 ppid=2992 pid=10441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:40.946000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:55:40.947000 audit[10441]: NETFILTER_CFG table=nat:140 family=2 entries=94 op=nft_register_rule pid=10441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:55:40.947000 audit[10441]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffc06579fb0 a2=0 a3=7ffc06579f9c items=0 ppid=2992 pid=10441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:40.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:55:40.975000 audit[10430]: USER_ACCT pid=10430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:40.976726 sshd[10430]: Accepted publickey for core from 147.75.109.163 port 36406 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:40.976000 audit[10430]: CRED_ACQ pid=10430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:40.976000 audit[10430]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee6362450 a2=3 a3=0 items=0 ppid=1 pid=10430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:40.976000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:40.977689 sshd[10430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:40.981032 systemd-logind[1541]: New session 62 of user core. Feb 9 12:55:40.981844 systemd[1]: Started session-62.scope. Feb 9 12:55:40.984000 audit[10430]: USER_START pid=10430 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:40.985000 audit[10468]: CRED_ACQ pid=10468 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:40.988000 audit[10469]: NETFILTER_CFG table=filter:141 family=2 entries=30 op=nft_register_rule pid=10469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:55:40.988000 audit[10469]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffe52d8bc00 a2=0 a3=7ffe52d8bbec items=0 ppid=2992 pid=10469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:40.988000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:55:40.990000 audit[10469]: NETFILTER_CFG table=nat:142 family=2 entries=94 op=nft_register_rule pid=10469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:55:40.990000 audit[10469]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffe52d8bc00 a2=0 a3=7ffe52d8bbec items=0 ppid=2992 pid=10469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:40.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:55:41.203218 sshd[10430]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:41.202000 audit[10430]: USER_END pid=10430 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:41.202000 audit[10430]: CRED_DISP pid=10430 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:41.204951 systemd[1]: Started sshd@64-139.178.91.169:22-147.75.109.163:36410.service. Feb 9 12:55:41.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.91.169:22-147.75.109.163:36410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:41.205250 systemd[1]: sshd@63-139.178.91.169:22-147.75.109.163:36406.service: Deactivated successfully. Feb 9 12:55:41.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.91.169:22-147.75.109.163:36406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:41.205897 systemd[1]: session-62.scope: Deactivated successfully. Feb 9 12:55:41.205918 systemd-logind[1541]: Session 62 logged out. Waiting for processes to exit. Feb 9 12:55:41.206338 systemd-logind[1541]: Removed session 62. Feb 9 12:55:41.229000 audit[10488]: USER_ACCT pid=10488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:41.231425 sshd[10488]: Accepted publickey for core from 147.75.109.163 port 36410 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:41.230000 audit[10488]: CRED_ACQ pid=10488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:41.230000 audit[10488]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8064d200 a2=3 a3=0 items=0 ppid=1 pid=10488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:41.230000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:41.232127 sshd[10488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:41.234743 systemd-logind[1541]: New session 63 of user core. Feb 9 12:55:41.235148 systemd[1]: Started session-63.scope. Feb 9 12:55:41.235000 audit[10488]: USER_START pid=10488 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:41.236000 audit[10493]: CRED_ACQ pid=10493 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:41.349733 sshd[10488]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:41.349000 audit[10488]: USER_END pid=10488 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:41.349000 audit[10488]: CRED_DISP pid=10488 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:41.352057 systemd[1]: sshd@64-139.178.91.169:22-147.75.109.163:36410.service: Deactivated successfully. Feb 9 12:55:41.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.91.169:22-147.75.109.163:36410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:41.353115 systemd[1]: session-63.scope: Deactivated successfully. Feb 9 12:55:41.353147 systemd-logind[1541]: Session 63 logged out. Waiting for processes to exit. Feb 9 12:55:41.354101 systemd-logind[1541]: Removed session 63. Feb 9 12:55:46.357386 systemd[1]: Started sshd@65-139.178.91.169:22-147.75.109.163:56054.service. Feb 9 12:55:46.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.91.169:22-147.75.109.163:56054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:46.384957 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 9 12:55:46.385004 kernel: audit: type=1130 audit(1707483346.356:833): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.91.169:22-147.75.109.163:56054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:46.494000 audit[10532]: USER_ACCT pid=10532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:46.496351 sshd[10532]: Accepted publickey for core from 147.75.109.163 port 56054 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:46.498167 sshd[10532]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:46.500688 systemd-logind[1541]: New session 64 of user core. Feb 9 12:55:46.501159 systemd[1]: Started session-64.scope. Feb 9 12:55:46.496000 audit[10532]: CRED_ACQ pid=10532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:46.678126 kernel: audit: type=1101 audit(1707483346.494:834): pid=10532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:46.678162 kernel: audit: type=1103 audit(1707483346.496:835): pid=10532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:46.678178 kernel: audit: type=1006 audit(1707483346.496:836): pid=10532 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=64 res=1 Feb 9 12:55:46.736725 kernel: audit: type=1300 audit(1707483346.496:836): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca4939ea0 a2=3 a3=0 items=0 ppid=1 pid=10532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:46.496000 audit[10532]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca4939ea0 a2=3 a3=0 items=0 ppid=1 pid=10532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:46.828695 kernel: audit: type=1327 audit(1707483346.496:836): proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:46.496000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:46.828959 sshd[10532]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:46.830308 systemd[1]: sshd@65-139.178.91.169:22-147.75.109.163:56054.service: Deactivated successfully. Feb 9 12:55:46.830943 systemd[1]: session-64.scope: Deactivated successfully. Feb 9 12:55:46.830960 systemd-logind[1541]: Session 64 logged out. Waiting for processes to exit. Feb 9 12:55:46.831333 systemd-logind[1541]: Removed session 64. Feb 9 12:55:46.502000 audit[10532]: USER_START pid=10532 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:46.953547 kernel: audit: type=1105 audit(1707483346.502:837): pid=10532 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:46.953586 kernel: audit: type=1103 audit(1707483346.502:838): pid=10535 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:46.502000 audit[10535]: CRED_ACQ pid=10535 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:47.042838 kernel: audit: type=1106 audit(1707483346.828:839): pid=10532 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:46.828000 audit[10532]: USER_END pid=10532 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:47.138302 kernel: audit: type=1104 audit(1707483346.828:840): pid=10532 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:46.828000 audit[10532]: CRED_DISP pid=10532 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:46.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.91.169:22-147.75.109.163:56054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:51.776426 systemd[1]: Started sshd@66-139.178.91.169:22-147.75.109.163:56064.service. Feb 9 12:55:51.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.91.169:22-147.75.109.163:56064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:51.803556 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:55:51.803627 kernel: audit: type=1130 audit(1707483351.775:842): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.91.169:22-147.75.109.163:56064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:51.912000 audit[10580]: USER_ACCT pid=10580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:51.914360 sshd[10580]: Accepted publickey for core from 147.75.109.163 port 56064 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:51.915706 sshd[10580]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:51.918150 systemd-logind[1541]: New session 65 of user core. Feb 9 12:55:51.918582 systemd[1]: Started session-65.scope. Feb 9 12:55:51.997702 sshd[10580]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:51.999155 systemd[1]: sshd@66-139.178.91.169:22-147.75.109.163:56064.service: Deactivated successfully. Feb 9 12:55:51.999865 systemd[1]: session-65.scope: Deactivated successfully. Feb 9 12:55:51.999907 systemd-logind[1541]: Session 65 logged out. Waiting for processes to exit. Feb 9 12:55:52.000441 systemd-logind[1541]: Removed session 65. Feb 9 12:55:51.914000 audit[10580]: CRED_ACQ pid=10580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:52.098507 kernel: audit: type=1101 audit(1707483351.912:843): pid=10580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:52.098553 kernel: audit: type=1103 audit(1707483351.914:844): pid=10580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:52.098576 kernel: audit: type=1006 audit(1707483351.914:845): pid=10580 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=65 res=1 Feb 9 12:55:52.157093 kernel: audit: type=1300 audit(1707483351.914:845): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5628e4a0 a2=3 a3=0 items=0 ppid=1 pid=10580 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:51.914000 audit[10580]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5628e4a0 a2=3 a3=0 items=0 ppid=1 pid=10580 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:52.249059 kernel: audit: type=1327 audit(1707483351.914:845): proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:51.914000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:52.279478 kernel: audit: type=1105 audit(1707483351.919:846): pid=10580 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:51.919000 audit[10580]: USER_START pid=10580 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:52.373946 kernel: audit: type=1103 audit(1707483351.919:847): pid=10583 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:51.919000 audit[10583]: CRED_ACQ pid=10583 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:52.463098 kernel: audit: type=1106 audit(1707483351.996:848): pid=10580 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:51.996000 audit[10580]: USER_END pid=10580 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:52.558534 kernel: audit: type=1104 audit(1707483351.996:849): pid=10580 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:51.996000 audit[10580]: CRED_DISP pid=10580 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:51.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.91.169:22-147.75.109.163:56064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:57.003955 systemd[1]: Started sshd@67-139.178.91.169:22-147.75.109.163:60198.service. Feb 9 12:55:57.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.91.169:22-147.75.109.163:60198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:57.030839 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:55:57.030904 kernel: audit: type=1130 audit(1707483357.002:851): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.91.169:22-147.75.109.163:60198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:55:57.146776 sshd[10633]: Accepted publickey for core from 147.75.109.163 port 60198 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:55:57.145000 audit[10633]: USER_ACCT pid=10633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:57.148813 sshd[10633]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:55:57.151315 systemd-logind[1541]: New session 66 of user core. Feb 9 12:55:57.151806 systemd[1]: Started session-66.scope. Feb 9 12:55:57.228597 sshd[10633]: pam_unix(sshd:session): session closed for user core Feb 9 12:55:57.230050 systemd[1]: sshd@67-139.178.91.169:22-147.75.109.163:60198.service: Deactivated successfully. Feb 9 12:55:57.230668 systemd-logind[1541]: Session 66 logged out. Waiting for processes to exit. Feb 9 12:55:57.230683 systemd[1]: session-66.scope: Deactivated successfully. Feb 9 12:55:57.231172 systemd-logind[1541]: Removed session 66. Feb 9 12:55:57.147000 audit[10633]: CRED_ACQ pid=10633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:57.328670 kernel: audit: type=1101 audit(1707483357.145:852): pid=10633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:57.328702 kernel: audit: type=1103 audit(1707483357.147:853): pid=10633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:57.328724 kernel: audit: type=1006 audit(1707483357.147:854): pid=10633 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=66 res=1 Feb 9 12:55:57.387214 kernel: audit: type=1300 audit(1707483357.147:854): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe99464310 a2=3 a3=0 items=0 ppid=1 pid=10633 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:57.147000 audit[10633]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe99464310 a2=3 a3=0 items=0 ppid=1 pid=10633 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:55:57.479073 kernel: audit: type=1327 audit(1707483357.147:854): proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:57.147000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:55:57.509471 kernel: audit: type=1105 audit(1707483357.152:855): pid=10633 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:57.152000 audit[10633]: USER_START pid=10633 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:57.603895 kernel: audit: type=1103 audit(1707483357.152:856): pid=10636 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:57.152000 audit[10636]: CRED_ACQ pid=10636 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:57.692998 kernel: audit: type=1106 audit(1707483357.227:857): pid=10633 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:57.227000 audit[10633]: USER_END pid=10633 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:57.788452 kernel: audit: type=1104 audit(1707483357.227:858): pid=10633 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:57.227000 audit[10633]: CRED_DISP pid=10633 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:55:57.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.91.169:22-147.75.109.163:60198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:02.235614 systemd[1]: Started sshd@68-139.178.91.169:22-147.75.109.163:60214.service. Feb 9 12:56:02.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.91.169:22-147.75.109.163:60214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:02.262787 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:56:02.262838 kernel: audit: type=1130 audit(1707483362.234:860): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.91.169:22-147.75.109.163:60214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:02.372935 sshd[10699]: Accepted publickey for core from 147.75.109.163 port 60214 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:56:02.371000 audit[10699]: USER_ACCT pid=10699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:02.374294 sshd[10699]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:56:02.376820 systemd-logind[1541]: New session 67 of user core. Feb 9 12:56:02.377326 systemd[1]: Started session-67.scope. Feb 9 12:56:02.455016 sshd[10699]: pam_unix(sshd:session): session closed for user core Feb 9 12:56:02.456480 systemd[1]: sshd@68-139.178.91.169:22-147.75.109.163:60214.service: Deactivated successfully. Feb 9 12:56:02.457116 systemd-logind[1541]: Session 67 logged out. Waiting for processes to exit. Feb 9 12:56:02.457151 systemd[1]: session-67.scope: Deactivated successfully. Feb 9 12:56:02.457607 systemd-logind[1541]: Removed session 67. Feb 9 12:56:02.372000 audit[10699]: CRED_ACQ pid=10699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:02.554760 kernel: audit: type=1101 audit(1707483362.371:861): pid=10699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:02.554800 kernel: audit: type=1103 audit(1707483362.372:862): pid=10699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:02.554818 kernel: audit: type=1006 audit(1707483362.372:863): pid=10699 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=67 res=1 Feb 9 12:56:02.613285 kernel: audit: type=1300 audit(1707483362.372:863): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff721d20f0 a2=3 a3=0 items=0 ppid=1 pid=10699 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:02.372000 audit[10699]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff721d20f0 a2=3 a3=0 items=0 ppid=1 pid=10699 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:02.705216 kernel: audit: type=1327 audit(1707483362.372:863): proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:02.372000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:02.378000 audit[10699]: USER_START pid=10699 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:02.830046 kernel: audit: type=1105 audit(1707483362.378:864): pid=10699 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:02.830078 kernel: audit: type=1103 audit(1707483362.379:865): pid=10702 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:02.379000 audit[10702]: CRED_ACQ pid=10702 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:02.919241 kernel: audit: type=1106 audit(1707483362.454:866): pid=10699 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:02.454000 audit[10699]: USER_END pid=10699 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:03.014691 kernel: audit: type=1104 audit(1707483362.454:867): pid=10699 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:02.454000 audit[10699]: CRED_DISP pid=10699 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:02.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.91.169:22-147.75.109.163:60214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:07.462355 systemd[1]: Started sshd@69-139.178.91.169:22-147.75.109.163:50502.service. Feb 9 12:56:07.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.91.169:22-147.75.109.163:50502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:07.489569 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:56:07.489646 kernel: audit: type=1130 audit(1707483367.461:869): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.91.169:22-147.75.109.163:50502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:07.597000 audit[10726]: USER_ACCT pid=10726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:07.598851 sshd[10726]: Accepted publickey for core from 147.75.109.163 port 50502 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:56:07.600130 sshd[10726]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:56:07.602410 systemd-logind[1541]: New session 68 of user core. Feb 9 12:56:07.603110 systemd[1]: Started session-68.scope. Feb 9 12:56:07.681330 sshd[10726]: pam_unix(sshd:session): session closed for user core Feb 9 12:56:07.682928 systemd[1]: sshd@69-139.178.91.169:22-147.75.109.163:50502.service: Deactivated successfully. Feb 9 12:56:07.683659 systemd-logind[1541]: Session 68 logged out. Waiting for processes to exit. Feb 9 12:56:07.683689 systemd[1]: session-68.scope: Deactivated successfully. Feb 9 12:56:07.684205 systemd-logind[1541]: Removed session 68. Feb 9 12:56:07.598000 audit[10726]: CRED_ACQ pid=10726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:07.692482 kernel: audit: type=1101 audit(1707483367.597:870): pid=10726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:07.692527 kernel: audit: type=1103 audit(1707483367.598:871): pid=10726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:07.841261 kernel: audit: type=1006 audit(1707483367.598:872): pid=10726 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=68 res=1 Feb 9 12:56:07.841293 kernel: audit: type=1300 audit(1707483367.598:872): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6d5f9110 a2=3 a3=0 items=0 ppid=1 pid=10726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:07.598000 audit[10726]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6d5f9110 a2=3 a3=0 items=0 ppid=1 pid=10726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:07.933241 kernel: audit: type=1327 audit(1707483367.598:872): proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:07.598000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:07.963670 kernel: audit: type=1105 audit(1707483367.603:873): pid=10726 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:07.603000 audit[10726]: USER_START pid=10726 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:07.604000 audit[10729]: CRED_ACQ pid=10729 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:08.058477 kernel: audit: type=1103 audit(1707483367.604:874): pid=10729 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:07.680000 audit[10726]: USER_END pid=10726 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:08.242983 kernel: audit: type=1106 audit(1707483367.680:875): pid=10726 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:08.243016 kernel: audit: type=1104 audit(1707483367.680:876): pid=10726 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:07.680000 audit[10726]: CRED_DISP pid=10726 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:07.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.91.169:22-147.75.109.163:50502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:12.688582 systemd[1]: Started sshd@70-139.178.91.169:22-147.75.109.163:50504.service. Feb 9 12:56:12.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.91.169:22-147.75.109.163:50504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:12.715405 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:56:12.715491 kernel: audit: type=1130 audit(1707483372.688:878): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.91.169:22-147.75.109.163:50504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:12.826000 audit[10753]: USER_ACCT pid=10753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:12.826616 sshd[10753]: Accepted publickey for core from 147.75.109.163 port 50504 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:56:12.827692 sshd[10753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:56:12.830108 systemd-logind[1541]: New session 69 of user core. Feb 9 12:56:12.830582 systemd[1]: Started session-69.scope. Feb 9 12:56:12.909457 sshd[10753]: pam_unix(sshd:session): session closed for user core Feb 9 12:56:12.910963 systemd[1]: sshd@70-139.178.91.169:22-147.75.109.163:50504.service: Deactivated successfully. Feb 9 12:56:12.911647 systemd[1]: session-69.scope: Deactivated successfully. Feb 9 12:56:12.911656 systemd-logind[1541]: Session 69 logged out. Waiting for processes to exit. Feb 9 12:56:12.912089 systemd-logind[1541]: Removed session 69. Feb 9 12:56:12.827000 audit[10753]: CRED_ACQ pid=10753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:13.010447 kernel: audit: type=1101 audit(1707483372.826:879): pid=10753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:13.010485 kernel: audit: type=1103 audit(1707483372.827:880): pid=10753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:13.010502 kernel: audit: type=1006 audit(1707483372.827:881): pid=10753 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=69 res=1 Feb 9 12:56:13.069099 kernel: audit: type=1300 audit(1707483372.827:881): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd84c54d60 a2=3 a3=0 items=0 ppid=1 pid=10753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:12.827000 audit[10753]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd84c54d60 a2=3 a3=0 items=0 ppid=1 pid=10753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:13.161337 kernel: audit: type=1327 audit(1707483372.827:881): proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:12.827000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:13.191733 kernel: audit: type=1105 audit(1707483372.832:882): pid=10753 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:12.832000 audit[10753]: USER_START pid=10753 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:13.286235 kernel: audit: type=1103 audit(1707483372.832:883): pid=10756 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:12.832000 audit[10756]: CRED_ACQ pid=10756 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:13.375475 kernel: audit: type=1106 audit(1707483372.909:884): pid=10753 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:12.909000 audit[10753]: USER_END pid=10753 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:13.470970 kernel: audit: type=1104 audit(1707483372.909:885): pid=10753 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:12.909000 audit[10753]: CRED_DISP pid=10753 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:12.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.91.169:22-147.75.109.163:50504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:17.915798 systemd[1]: Started sshd@71-139.178.91.169:22-147.75.109.163:49276.service. Feb 9 12:56:17.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.91.169:22-147.75.109.163:49276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:17.942932 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:56:17.942999 kernel: audit: type=1130 audit(1707483377.915:887): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.91.169:22-147.75.109.163:49276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:18.059000 audit[10781]: USER_ACCT pid=10781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:18.059569 sshd[10781]: Accepted publickey for core from 147.75.109.163 port 49276 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:56:18.060414 sshd[10781]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:56:18.062918 systemd-logind[1541]: New session 70 of user core. Feb 9 12:56:18.063340 systemd[1]: Started session-70.scope. Feb 9 12:56:18.140394 sshd[10781]: pam_unix(sshd:session): session closed for user core Feb 9 12:56:18.141862 systemd[1]: sshd@71-139.178.91.169:22-147.75.109.163:49276.service: Deactivated successfully. Feb 9 12:56:18.142454 systemd[1]: session-70.scope: Deactivated successfully. Feb 9 12:56:18.142462 systemd-logind[1541]: Session 70 logged out. Waiting for processes to exit. Feb 9 12:56:18.143002 systemd-logind[1541]: Removed session 70. Feb 9 12:56:18.059000 audit[10781]: CRED_ACQ pid=10781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:18.242266 kernel: audit: type=1101 audit(1707483378.059:888): pid=10781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:18.242307 kernel: audit: type=1103 audit(1707483378.059:889): pid=10781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:18.242323 kernel: audit: type=1006 audit(1707483378.059:890): pid=10781 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=70 res=1 Feb 9 12:56:18.300802 kernel: audit: type=1300 audit(1707483378.059:890): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd2fb75a0 a2=3 a3=0 items=0 ppid=1 pid=10781 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:18.059000 audit[10781]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd2fb75a0 a2=3 a3=0 items=0 ppid=1 pid=10781 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:18.392760 kernel: audit: type=1327 audit(1707483378.059:890): proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:18.059000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:18.065000 audit[10781]: USER_START pid=10781 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:18.517654 kernel: audit: type=1105 audit(1707483378.065:891): pid=10781 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:18.517684 kernel: audit: type=1103 audit(1707483378.065:892): pid=10784 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:18.065000 audit[10784]: CRED_ACQ pid=10784 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:18.606820 kernel: audit: type=1106 audit(1707483378.140:893): pid=10781 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:18.140000 audit[10781]: USER_END pid=10781 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:18.702251 kernel: audit: type=1104 audit(1707483378.140:894): pid=10781 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:18.140000 audit[10781]: CRED_DISP pid=10781 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:18.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.91.169:22-147.75.109.163:49276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:23.147469 systemd[1]: Started sshd@72-139.178.91.169:22-147.75.109.163:49288.service. Feb 9 12:56:23.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.91.169:22-147.75.109.163:49288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:23.174459 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:56:23.174551 kernel: audit: type=1130 audit(1707483383.147:896): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.91.169:22-147.75.109.163:49288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:23.284000 audit[10846]: USER_ACCT pid=10846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:23.285536 sshd[10846]: Accepted publickey for core from 147.75.109.163 port 49288 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:56:23.286708 sshd[10846]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:56:23.289332 systemd-logind[1541]: New session 71 of user core. Feb 9 12:56:23.290045 systemd[1]: Started session-71.scope. Feb 9 12:56:23.369602 sshd[10846]: pam_unix(sshd:session): session closed for user core Feb 9 12:56:23.371082 systemd[1]: sshd@72-139.178.91.169:22-147.75.109.163:49288.service: Deactivated successfully. Feb 9 12:56:23.371824 systemd[1]: session-71.scope: Deactivated successfully. Feb 9 12:56:23.371885 systemd-logind[1541]: Session 71 logged out. Waiting for processes to exit. Feb 9 12:56:23.372526 systemd-logind[1541]: Removed session 71. Feb 9 12:56:23.286000 audit[10846]: CRED_ACQ pid=10846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:23.469537 kernel: audit: type=1101 audit(1707483383.284:897): pid=10846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:23.469581 kernel: audit: type=1103 audit(1707483383.286:898): pid=10846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:23.469598 kernel: audit: type=1006 audit(1707483383.286:899): pid=10846 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=71 res=1 Feb 9 12:56:23.528087 kernel: audit: type=1300 audit(1707483383.286:899): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefbfd4970 a2=3 a3=0 items=0 ppid=1 pid=10846 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:23.286000 audit[10846]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefbfd4970 a2=3 a3=0 items=0 ppid=1 pid=10846 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:23.619971 kernel: audit: type=1327 audit(1707483383.286:899): proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:23.286000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:23.650356 kernel: audit: type=1105 audit(1707483383.292:900): pid=10846 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:23.292000 audit[10846]: USER_START pid=10846 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:23.744787 kernel: audit: type=1103 audit(1707483383.292:901): pid=10852 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:23.292000 audit[10852]: CRED_ACQ pid=10852 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:23.369000 audit[10846]: USER_END pid=10846 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:23.929365 kernel: audit: type=1106 audit(1707483383.369:902): pid=10846 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:23.929398 kernel: audit: type=1104 audit(1707483383.369:903): pid=10846 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:23.369000 audit[10846]: CRED_DISP pid=10846 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:23.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.91.169:22-147.75.109.163:49288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:28.378043 systemd[1]: Started sshd@73-139.178.91.169:22-147.75.109.163:40870.service. Feb 9 12:56:28.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.91.169:22-147.75.109.163:40870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:28.405379 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:56:28.405470 kernel: audit: type=1130 audit(1707483388.378:905): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.91.169:22-147.75.109.163:40870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:28.516000 audit[10941]: USER_ACCT pid=10941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:28.516963 sshd[10941]: Accepted publickey for core from 147.75.109.163 port 40870 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:56:28.520555 sshd[10941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:56:28.531563 systemd-logind[1541]: New session 72 of user core. Feb 9 12:56:28.533337 systemd[1]: Started session-72.scope. Feb 9 12:56:28.519000 audit[10941]: CRED_ACQ pid=10941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:28.698572 kernel: audit: type=1101 audit(1707483388.516:906): pid=10941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:28.698606 kernel: audit: type=1103 audit(1707483388.519:907): pid=10941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:28.698625 kernel: audit: type=1006 audit(1707483388.519:908): pid=10941 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=72 res=1 Feb 9 12:56:28.757187 kernel: audit: type=1300 audit(1707483388.519:908): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7cc75ee0 a2=3 a3=0 items=0 ppid=1 pid=10941 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:28.519000 audit[10941]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7cc75ee0 a2=3 a3=0 items=0 ppid=1 pid=10941 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:28.849175 kernel: audit: type=1327 audit(1707483388.519:908): proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:28.519000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:28.849365 sshd[10941]: pam_unix(sshd:session): session closed for user core Feb 9 12:56:28.850800 systemd[1]: sshd@73-139.178.91.169:22-147.75.109.163:40870.service: Deactivated successfully. Feb 9 12:56:28.851372 systemd-logind[1541]: Session 72 logged out. Waiting for processes to exit. Feb 9 12:56:28.851417 systemd[1]: session-72.scope: Deactivated successfully. Feb 9 12:56:28.851966 systemd-logind[1541]: Removed session 72. Feb 9 12:56:28.879611 kernel: audit: type=1105 audit(1707483388.539:909): pid=10941 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:28.539000 audit[10941]: USER_START pid=10941 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:28.974063 kernel: audit: type=1103 audit(1707483388.541:910): pid=10944 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:28.541000 audit[10944]: CRED_ACQ pid=10944 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:29.063281 kernel: audit: type=1106 audit(1707483388.849:911): pid=10941 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:28.849000 audit[10941]: USER_END pid=10941 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:29.158759 kernel: audit: type=1104 audit(1707483388.849:912): pid=10941 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:28.849000 audit[10941]: CRED_DISP pid=10941 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:28.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.91.169:22-147.75.109.163:40870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:33.799055 systemd[1]: Started sshd@74-139.178.91.169:22-147.75.109.163:40872.service. Feb 9 12:56:33.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.91.169:22-147.75.109.163:40872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:33.826062 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:56:33.826121 kernel: audit: type=1130 audit(1707483393.798:914): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.91.169:22-147.75.109.163:40872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:33.936000 audit[10971]: USER_ACCT pid=10971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:33.936904 sshd[10971]: Accepted publickey for core from 147.75.109.163 port 40872 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:56:33.938089 sshd[10971]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:56:33.940352 systemd-logind[1541]: New session 73 of user core. Feb 9 12:56:33.940801 systemd[1]: Started session-73.scope. Feb 9 12:56:34.018797 sshd[10971]: pam_unix(sshd:session): session closed for user core Feb 9 12:56:34.020145 systemd[1]: sshd@74-139.178.91.169:22-147.75.109.163:40872.service: Deactivated successfully. Feb 9 12:56:34.020802 systemd-logind[1541]: Session 73 logged out. Waiting for processes to exit. Feb 9 12:56:34.020830 systemd[1]: session-73.scope: Deactivated successfully. Feb 9 12:56:34.021293 systemd-logind[1541]: Removed session 73. Feb 9 12:56:33.937000 audit[10971]: CRED_ACQ pid=10971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:34.118726 kernel: audit: type=1101 audit(1707483393.936:915): pid=10971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:34.118776 kernel: audit: type=1103 audit(1707483393.937:916): pid=10971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:34.118793 kernel: audit: type=1006 audit(1707483393.937:917): pid=10971 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=73 res=1 Feb 9 12:56:34.177465 kernel: audit: type=1300 audit(1707483393.937:917): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd82da600 a2=3 a3=0 items=0 ppid=1 pid=10971 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:33.937000 audit[10971]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd82da600 a2=3 a3=0 items=0 ppid=1 pid=10971 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:34.269341 kernel: audit: type=1327 audit(1707483393.937:917): proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:33.937000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:33.942000 audit[10971]: USER_START pid=10971 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:34.394201 kernel: audit: type=1105 audit(1707483393.942:918): pid=10971 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:34.394233 kernel: audit: type=1103 audit(1707483393.943:919): pid=10974 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:33.943000 audit[10974]: CRED_ACQ pid=10974 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:34.019000 audit[10971]: USER_END pid=10971 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:34.578815 kernel: audit: type=1106 audit(1707483394.019:920): pid=10971 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:34.578905 kernel: audit: type=1104 audit(1707483394.019:921): pid=10971 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:34.019000 audit[10971]: CRED_DISP pid=10971 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:34.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.91.169:22-147.75.109.163:40872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:39.026312 systemd[1]: Started sshd@75-139.178.91.169:22-147.75.109.163:53274.service. Feb 9 12:56:39.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.91.169:22-147.75.109.163:53274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:39.053447 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:56:39.053544 kernel: audit: type=1130 audit(1707483399.026:923): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.91.169:22-147.75.109.163:53274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:39.164472 sshd[10998]: Accepted publickey for core from 147.75.109.163 port 53274 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:56:39.164000 audit[10998]: USER_ACCT pid=10998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:39.165693 sshd[10998]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:56:39.168076 systemd-logind[1541]: New session 74 of user core. Feb 9 12:56:39.168551 systemd[1]: Started session-74.scope. Feb 9 12:56:39.245984 sshd[10998]: pam_unix(sshd:session): session closed for user core Feb 9 12:56:39.247204 systemd[1]: sshd@75-139.178.91.169:22-147.75.109.163:53274.service: Deactivated successfully. Feb 9 12:56:39.247886 systemd[1]: session-74.scope: Deactivated successfully. Feb 9 12:56:39.247895 systemd-logind[1541]: Session 74 logged out. Waiting for processes to exit. Feb 9 12:56:39.248309 systemd-logind[1541]: Removed session 74. Feb 9 12:56:39.165000 audit[10998]: CRED_ACQ pid=10998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:39.256482 kernel: audit: type=1101 audit(1707483399.164:924): pid=10998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:39.256523 kernel: audit: type=1103 audit(1707483399.165:925): pid=10998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:39.405452 kernel: audit: type=1006 audit(1707483399.165:926): pid=10998 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=74 res=1 Feb 9 12:56:39.405532 kernel: audit: type=1300 audit(1707483399.165:926): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe398b54f0 a2=3 a3=0 items=0 ppid=1 pid=10998 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:39.165000 audit[10998]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe398b54f0 a2=3 a3=0 items=0 ppid=1 pid=10998 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:39.165000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:39.527926 kernel: audit: type=1327 audit(1707483399.165:926): proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:39.527984 kernel: audit: type=1105 audit(1707483399.170:927): pid=10998 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:39.170000 audit[10998]: USER_START pid=10998 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:39.171000 audit[11001]: CRED_ACQ pid=11001 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:39.711580 kernel: audit: type=1103 audit(1707483399.171:928): pid=11001 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:39.711643 kernel: audit: type=1106 audit(1707483399.246:929): pid=10998 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:39.246000 audit[10998]: USER_END pid=10998 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:39.246000 audit[10998]: CRED_DISP pid=10998 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:39.896259 kernel: audit: type=1104 audit(1707483399.246:930): pid=10998 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:39.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.91.169:22-147.75.109.163:53274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:44.252377 systemd[1]: Started sshd@76-139.178.91.169:22-147.75.109.163:53284.service. Feb 9 12:56:44.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.91.169:22-147.75.109.163:53284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:44.279538 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:56:44.279753 kernel: audit: type=1130 audit(1707483404.252:932): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.91.169:22-147.75.109.163:53284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:44.390442 sshd[11025]: Accepted publickey for core from 147.75.109.163 port 53284 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:56:44.390000 audit[11025]: USER_ACCT pid=11025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:44.391737 sshd[11025]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:56:44.394346 systemd-logind[1541]: New session 75 of user core. Feb 9 12:56:44.394927 systemd[1]: Started session-75.scope. Feb 9 12:56:44.472832 sshd[11025]: pam_unix(sshd:session): session closed for user core Feb 9 12:56:44.474161 systemd[1]: sshd@76-139.178.91.169:22-147.75.109.163:53284.service: Deactivated successfully. Feb 9 12:56:44.474783 systemd[1]: session-75.scope: Deactivated successfully. Feb 9 12:56:44.474836 systemd-logind[1541]: Session 75 logged out. Waiting for processes to exit. Feb 9 12:56:44.475296 systemd-logind[1541]: Removed session 75. Feb 9 12:56:44.391000 audit[11025]: CRED_ACQ pid=11025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:44.572421 kernel: audit: type=1101 audit(1707483404.390:933): pid=11025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:44.572476 kernel: audit: type=1103 audit(1707483404.391:934): pid=11025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:44.572515 kernel: audit: type=1006 audit(1707483404.391:935): pid=11025 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=75 res=1 Feb 9 12:56:44.391000 audit[11025]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7b185500 a2=3 a3=0 items=0 ppid=1 pid=11025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:44.723025 kernel: audit: type=1300 audit(1707483404.391:935): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7b185500 a2=3 a3=0 items=0 ppid=1 pid=11025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:44.723070 kernel: audit: type=1327 audit(1707483404.391:935): proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:44.391000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:44.396000 audit[11025]: USER_START pid=11025 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:44.847925 kernel: audit: type=1105 audit(1707483404.396:936): pid=11025 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:44.847979 kernel: audit: type=1103 audit(1707483404.397:937): pid=11028 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:44.397000 audit[11028]: CRED_ACQ pid=11028 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:44.473000 audit[11025]: USER_END pid=11025 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:45.032616 kernel: audit: type=1106 audit(1707483404.473:938): pid=11025 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:45.032674 kernel: audit: type=1104 audit(1707483404.473:939): pid=11025 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:44.473000 audit[11025]: CRED_DISP pid=11025 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:44.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.91.169:22-147.75.109.163:53284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:49.478860 systemd[1]: Started sshd@77-139.178.91.169:22-147.75.109.163:50966.service. Feb 9 12:56:49.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.91.169:22-147.75.109.163:50966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:49.505813 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:56:49.506012 kernel: audit: type=1130 audit(1707483409.478:941): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.91.169:22-147.75.109.163:50966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:49.617793 sshd[11050]: Accepted publickey for core from 147.75.109.163 port 50966 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:56:49.617000 audit[11050]: USER_ACCT pid=11050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:49.620211 sshd[11050]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:56:49.622747 systemd-logind[1541]: New session 76 of user core. Feb 9 12:56:49.623262 systemd[1]: Started session-76.scope. Feb 9 12:56:49.702484 sshd[11050]: pam_unix(sshd:session): session closed for user core Feb 9 12:56:49.704040 systemd[1]: sshd@77-139.178.91.169:22-147.75.109.163:50966.service: Deactivated successfully. Feb 9 12:56:49.704852 systemd[1]: session-76.scope: Deactivated successfully. Feb 9 12:56:49.704870 systemd-logind[1541]: Session 76 logged out. Waiting for processes to exit. Feb 9 12:56:49.705480 systemd-logind[1541]: Removed session 76. Feb 9 12:56:49.619000 audit[11050]: CRED_ACQ pid=11050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:49.801973 kernel: audit: type=1101 audit(1707483409.617:942): pid=11050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:49.802029 kernel: audit: type=1103 audit(1707483409.619:943): pid=11050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:49.802075 kernel: audit: type=1006 audit(1707483409.619:944): pid=11050 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=76 res=1 Feb 9 12:56:49.619000 audit[11050]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffab2ee40 a2=3 a3=0 items=0 ppid=1 pid=11050 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:49.952598 kernel: audit: type=1300 audit(1707483409.619:944): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffab2ee40 a2=3 a3=0 items=0 ppid=1 pid=11050 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:49.952648 kernel: audit: type=1327 audit(1707483409.619:944): proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:49.619000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:49.624000 audit[11050]: USER_START pid=11050 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:50.077437 kernel: audit: type=1105 audit(1707483409.624:945): pid=11050 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:50.077480 kernel: audit: type=1103 audit(1707483409.625:946): pid=11053 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:49.625000 audit[11053]: CRED_ACQ pid=11053 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:49.702000 audit[11050]: USER_END pid=11050 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:50.262130 kernel: audit: type=1106 audit(1707483409.702:947): pid=11050 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:50.262183 kernel: audit: type=1104 audit(1707483409.702:948): pid=11050 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:49.702000 audit[11050]: CRED_DISP pid=11050 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:49.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.91.169:22-147.75.109.163:50966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:54.709286 systemd[1]: Started sshd@78-139.178.91.169:22-147.75.109.163:49956.service. Feb 9 12:56:54.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.91.169:22-147.75.109.163:49956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:54.736275 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:56:54.736347 kernel: audit: type=1130 audit(1707483414.708:950): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.91.169:22-147.75.109.163:49956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:54.846000 audit[11096]: USER_ACCT pid=11096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:54.847227 sshd[11096]: Accepted publickey for core from 147.75.109.163 port 49956 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:56:54.849688 sshd[11096]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:56:54.852274 systemd-logind[1541]: New session 77 of user core. Feb 9 12:56:54.852783 systemd[1]: Started session-77.scope. Feb 9 12:56:54.849000 audit[11096]: CRED_ACQ pid=11096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:54.941966 sshd[11096]: pam_unix(sshd:session): session closed for user core Feb 9 12:56:54.943373 systemd[1]: sshd@78-139.178.91.169:22-147.75.109.163:49956.service: Deactivated successfully. Feb 9 12:56:54.944003 systemd[1]: session-77.scope: Deactivated successfully. Feb 9 12:56:54.944018 systemd-logind[1541]: Session 77 logged out. Waiting for processes to exit. Feb 9 12:56:54.944616 systemd-logind[1541]: Removed session 77. Feb 9 12:56:55.030433 kernel: audit: type=1101 audit(1707483414.846:951): pid=11096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:55.030487 kernel: audit: type=1103 audit(1707483414.849:952): pid=11096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:55.030510 kernel: audit: type=1006 audit(1707483414.849:953): pid=11096 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=77 res=1 Feb 9 12:56:55.089059 kernel: audit: type=1300 audit(1707483414.849:953): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc01599f10 a2=3 a3=0 items=0 ppid=1 pid=11096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:54.849000 audit[11096]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc01599f10 a2=3 a3=0 items=0 ppid=1 pid=11096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:56:55.180990 kernel: audit: type=1327 audit(1707483414.849:953): proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:54.849000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:56:55.211376 kernel: audit: type=1105 audit(1707483414.855:954): pid=11096 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:54.855000 audit[11096]: USER_START pid=11096 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:55.305784 kernel: audit: type=1103 audit(1707483414.856:955): pid=11099 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:54.856000 audit[11099]: CRED_ACQ pid=11099 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:55.394891 kernel: audit: type=1106 audit(1707483414.942:956): pid=11096 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:54.942000 audit[11096]: USER_END pid=11096 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:55.490300 kernel: audit: type=1104 audit(1707483414.942:957): pid=11096 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:54.942000 audit[11096]: CRED_DISP pid=11096 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:56:54.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.91.169:22-147.75.109.163:49956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:59.948741 systemd[1]: Started sshd@79-139.178.91.169:22-147.75.109.163:49970.service. Feb 9 12:56:59.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.91.169:22-147.75.109.163:49970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:56:59.975990 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:56:59.976090 kernel: audit: type=1130 audit(1707483419.948:959): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.91.169:22-147.75.109.163:49970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:00.087435 sshd[11187]: Accepted publickey for core from 147.75.109.163 port 49970 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:57:00.087000 audit[11187]: USER_ACCT pid=11187 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:00.090094 sshd[11187]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:57:00.092676 systemd-logind[1541]: New session 78 of user core. Feb 9 12:57:00.093127 systemd[1]: Started session-78.scope. Feb 9 12:57:00.089000 audit[11187]: CRED_ACQ pid=11187 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:00.180857 sshd[11187]: pam_unix(sshd:session): session closed for user core Feb 9 12:57:00.182405 systemd[1]: sshd@79-139.178.91.169:22-147.75.109.163:49970.service: Deactivated successfully. Feb 9 12:57:00.183036 systemd-logind[1541]: Session 78 logged out. Waiting for processes to exit. Feb 9 12:57:00.183049 systemd[1]: session-78.scope: Deactivated successfully. Feb 9 12:57:00.183597 systemd-logind[1541]: Removed session 78. Feb 9 12:57:00.269271 kernel: audit: type=1101 audit(1707483420.087:960): pid=11187 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:00.269316 kernel: audit: type=1103 audit(1707483420.089:961): pid=11187 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:00.269333 kernel: audit: type=1006 audit(1707483420.089:962): pid=11187 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=78 res=1 Feb 9 12:57:00.327854 kernel: audit: type=1300 audit(1707483420.089:962): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddc6485a0 a2=3 a3=0 items=0 ppid=1 pid=11187 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:00.089000 audit[11187]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddc6485a0 a2=3 a3=0 items=0 ppid=1 pid=11187 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:00.419781 kernel: audit: type=1327 audit(1707483420.089:962): proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:00.089000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:00.450141 kernel: audit: type=1105 audit(1707483420.095:963): pid=11187 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:00.095000 audit[11187]: USER_START pid=11187 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:00.544555 kernel: audit: type=1103 audit(1707483420.096:964): pid=11190 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:00.096000 audit[11190]: CRED_ACQ pid=11190 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:00.633641 kernel: audit: type=1106 audit(1707483420.181:965): pid=11187 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:00.181000 audit[11187]: USER_END pid=11187 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:00.729016 kernel: audit: type=1104 audit(1707483420.181:966): pid=11187 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:00.181000 audit[11187]: CRED_DISP pid=11187 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:00.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.91.169:22-147.75.109.163:49970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:05.189215 systemd[1]: Started sshd@80-139.178.91.169:22-147.75.109.163:54118.service. Feb 9 12:57:05.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.91.169:22-147.75.109.163:54118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:05.216710 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:57:05.216781 kernel: audit: type=1130 audit(1707483425.189:968): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.91.169:22-147.75.109.163:54118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:05.327000 audit[11214]: USER_ACCT pid=11214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:05.327970 sshd[11214]: Accepted publickey for core from 147.75.109.163 port 54118 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:57:05.330671 sshd[11214]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:57:05.333258 systemd-logind[1541]: New session 79 of user core. Feb 9 12:57:05.333665 systemd[1]: Started session-79.scope. Feb 9 12:57:05.330000 audit[11214]: CRED_ACQ pid=11214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:05.421263 sshd[11214]: pam_unix(sshd:session): session closed for user core Feb 9 12:57:05.422811 systemd[1]: sshd@80-139.178.91.169:22-147.75.109.163:54118.service: Deactivated successfully. Feb 9 12:57:05.423439 systemd[1]: session-79.scope: Deactivated successfully. Feb 9 12:57:05.423488 systemd-logind[1541]: Session 79 logged out. Waiting for processes to exit. Feb 9 12:57:05.424061 systemd-logind[1541]: Removed session 79. Feb 9 12:57:05.509779 kernel: audit: type=1101 audit(1707483425.327:969): pid=11214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:05.509819 kernel: audit: type=1103 audit(1707483425.330:970): pid=11214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:05.509836 kernel: audit: type=1006 audit(1707483425.330:971): pid=11214 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=79 res=1 Feb 9 12:57:05.568356 kernel: audit: type=1300 audit(1707483425.330:971): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2a4b7c50 a2=3 a3=0 items=0 ppid=1 pid=11214 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:05.330000 audit[11214]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2a4b7c50 a2=3 a3=0 items=0 ppid=1 pid=11214 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:05.660317 kernel: audit: type=1327 audit(1707483425.330:971): proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:05.330000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:05.690725 kernel: audit: type=1105 audit(1707483425.336:972): pid=11214 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:05.336000 audit[11214]: USER_START pid=11214 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:05.336000 audit[11217]: CRED_ACQ pid=11217 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:05.874285 kernel: audit: type=1103 audit(1707483425.336:973): pid=11217 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:05.874335 kernel: audit: type=1106 audit(1707483425.421:974): pid=11214 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:05.421000 audit[11214]: USER_END pid=11214 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:05.969677 kernel: audit: type=1104 audit(1707483425.421:975): pid=11214 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:05.421000 audit[11214]: CRED_DISP pid=11214 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:05.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.91.169:22-147.75.109.163:54118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:10.429739 systemd[1]: Started sshd@81-139.178.91.169:22-147.75.109.163:54130.service. Feb 9 12:57:10.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.91.169:22-147.75.109.163:54130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:10.457140 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:57:10.457210 kernel: audit: type=1130 audit(1707483430.430:977): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.91.169:22-147.75.109.163:54130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:10.566000 audit[11241]: USER_ACCT pid=11241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:10.567544 sshd[11241]: Accepted publickey for core from 147.75.109.163 port 54130 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:57:10.568695 sshd[11241]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:57:10.571105 systemd-logind[1541]: New session 80 of user core. Feb 9 12:57:10.571692 systemd[1]: Started session-80.scope. Feb 9 12:57:10.647596 sshd[11241]: pam_unix(sshd:session): session closed for user core Feb 9 12:57:10.649071 systemd[1]: sshd@81-139.178.91.169:22-147.75.109.163:54130.service: Deactivated successfully. Feb 9 12:57:10.649721 systemd[1]: session-80.scope: Deactivated successfully. Feb 9 12:57:10.649760 systemd-logind[1541]: Session 80 logged out. Waiting for processes to exit. Feb 9 12:57:10.650283 systemd-logind[1541]: Removed session 80. Feb 9 12:57:10.568000 audit[11241]: CRED_ACQ pid=11241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:10.659407 kernel: audit: type=1101 audit(1707483430.566:978): pid=11241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:10.659433 kernel: audit: type=1103 audit(1707483430.568:979): pid=11241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:10.750452 kernel: audit: type=1006 audit(1707483430.568:980): pid=11241 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=80 res=1 Feb 9 12:57:10.568000 audit[11241]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2e7f4510 a2=3 a3=0 items=0 ppid=1 pid=11241 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:10.900426 kernel: audit: type=1300 audit(1707483430.568:980): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2e7f4510 a2=3 a3=0 items=0 ppid=1 pid=11241 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:10.900457 kernel: audit: type=1327 audit(1707483430.568:980): proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:10.568000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:10.930799 kernel: audit: type=1105 audit(1707483430.573:981): pid=11241 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:10.573000 audit[11241]: USER_START pid=11241 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:11.025239 kernel: audit: type=1103 audit(1707483430.573:982): pid=11244 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:10.573000 audit[11244]: CRED_ACQ pid=11244 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:11.114409 kernel: audit: type=1106 audit(1707483430.647:983): pid=11241 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:10.647000 audit[11241]: USER_END pid=11241 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:11.209850 kernel: audit: type=1104 audit(1707483430.648:984): pid=11241 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:10.648000 audit[11241]: CRED_DISP pid=11241 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:10.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.91.169:22-147.75.109.163:54130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:15.654513 systemd[1]: Started sshd@82-139.178.91.169:22-147.75.109.163:60424.service. Feb 9 12:57:15.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.91.169:22-147.75.109.163:60424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:15.681469 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:57:15.681561 kernel: audit: type=1130 audit(1707483435.654:986): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.91.169:22-147.75.109.163:60424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:15.792000 audit[11270]: USER_ACCT pid=11270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:15.792764 sshd[11270]: Accepted publickey for core from 147.75.109.163 port 60424 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:57:15.793707 sshd[11270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:57:15.796302 systemd-logind[1541]: New session 81 of user core. Feb 9 12:57:15.796917 systemd[1]: Started session-81.scope. Feb 9 12:57:15.873587 sshd[11270]: pam_unix(sshd:session): session closed for user core Feb 9 12:57:15.874877 systemd[1]: sshd@82-139.178.91.169:22-147.75.109.163:60424.service: Deactivated successfully. Feb 9 12:57:15.875456 systemd[1]: session-81.scope: Deactivated successfully. Feb 9 12:57:15.875471 systemd-logind[1541]: Session 81 logged out. Waiting for processes to exit. Feb 9 12:57:15.876006 systemd-logind[1541]: Removed session 81. Feb 9 12:57:15.793000 audit[11270]: CRED_ACQ pid=11270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:15.974447 kernel: audit: type=1101 audit(1707483435.792:987): pid=11270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:15.974492 kernel: audit: type=1103 audit(1707483435.793:988): pid=11270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:15.974511 kernel: audit: type=1006 audit(1707483435.793:989): pid=11270 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=81 res=1 Feb 9 12:57:15.793000 audit[11270]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc0e05c20 a2=3 a3=0 items=0 ppid=1 pid=11270 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:16.125065 kernel: audit: type=1300 audit(1707483435.793:989): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc0e05c20 a2=3 a3=0 items=0 ppid=1 pid=11270 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:16.125109 kernel: audit: type=1327 audit(1707483435.793:989): proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:15.793000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:16.155469 kernel: audit: type=1105 audit(1707483435.798:990): pid=11270 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:15.798000 audit[11270]: USER_START pid=11270 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:16.249932 kernel: audit: type=1103 audit(1707483435.799:991): pid=11273 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:15.799000 audit[11273]: CRED_ACQ pid=11273 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:16.339131 kernel: audit: type=1106 audit(1707483435.873:992): pid=11270 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:15.873000 audit[11270]: USER_END pid=11270 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:15.873000 audit[11270]: CRED_DISP pid=11270 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:16.523920 kernel: audit: type=1104 audit(1707483435.873:993): pid=11270 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:15.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.91.169:22-147.75.109.163:60424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:20.880822 systemd[1]: Started sshd@83-139.178.91.169:22-147.75.109.163:60426.service. Feb 9 12:57:20.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.91.169:22-147.75.109.163:60426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:20.907919 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:57:20.907996 kernel: audit: type=1130 audit(1707483440.880:995): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.91.169:22-147.75.109.163:60426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:21.019000 audit[11350]: USER_ACCT pid=11350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:21.019924 sshd[11350]: Accepted publickey for core from 147.75.109.163 port 60426 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:57:21.021583 sshd[11350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:57:21.023986 systemd-logind[1541]: New session 82 of user core. Feb 9 12:57:21.024499 systemd[1]: Started session-82.scope. Feb 9 12:57:21.101751 sshd[11350]: pam_unix(sshd:session): session closed for user core Feb 9 12:57:21.103130 systemd[1]: sshd@83-139.178.91.169:22-147.75.109.163:60426.service: Deactivated successfully. Feb 9 12:57:21.103790 systemd[1]: session-82.scope: Deactivated successfully. Feb 9 12:57:21.103803 systemd-logind[1541]: Session 82 logged out. Waiting for processes to exit. Feb 9 12:57:21.104362 systemd-logind[1541]: Removed session 82. Feb 9 12:57:21.020000 audit[11350]: CRED_ACQ pid=11350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:21.201644 kernel: audit: type=1101 audit(1707483441.019:996): pid=11350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:21.201685 kernel: audit: type=1103 audit(1707483441.020:997): pid=11350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:21.201704 kernel: audit: type=1006 audit(1707483441.020:998): pid=11350 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=82 res=1 Feb 9 12:57:21.260210 kernel: audit: type=1300 audit(1707483441.020:998): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4098b8e0 a2=3 a3=0 items=0 ppid=1 pid=11350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:21.020000 audit[11350]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4098b8e0 a2=3 a3=0 items=0 ppid=1 pid=11350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:21.352195 kernel: audit: type=1327 audit(1707483441.020:998): proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:21.020000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:21.382539 kernel: audit: type=1105 audit(1707483441.025:999): pid=11350 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:21.025000 audit[11350]: USER_START pid=11350 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:21.477059 kernel: audit: type=1103 audit(1707483441.026:1000): pid=11353 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:21.026000 audit[11353]: CRED_ACQ pid=11353 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:21.102000 audit[11350]: USER_END pid=11350 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:21.661910 kernel: audit: type=1106 audit(1707483441.102:1001): pid=11350 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:21.661939 kernel: audit: type=1104 audit(1707483441.102:1002): pid=11350 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:21.102000 audit[11350]: CRED_DISP pid=11350 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:21.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.91.169:22-147.75.109.163:60426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:26.109454 systemd[1]: Started sshd@84-139.178.91.169:22-147.75.109.163:37642.service. Feb 9 12:57:26.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.91.169:22-147.75.109.163:37642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:26.136887 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:57:26.136969 kernel: audit: type=1130 audit(1707483446.109:1004): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.91.169:22-147.75.109.163:37642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:26.247000 audit[11402]: USER_ACCT pid=11402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:26.248072 sshd[11402]: Accepted publickey for core from 147.75.109.163 port 37642 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:57:26.248749 sshd[11402]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:57:26.251124 systemd-logind[1541]: New session 83 of user core. Feb 9 12:57:26.251540 systemd[1]: Started session-83.scope. Feb 9 12:57:26.331823 sshd[11402]: pam_unix(sshd:session): session closed for user core Feb 9 12:57:26.333220 systemd[1]: sshd@84-139.178.91.169:22-147.75.109.163:37642.service: Deactivated successfully. Feb 9 12:57:26.333896 systemd[1]: session-83.scope: Deactivated successfully. Feb 9 12:57:26.333942 systemd-logind[1541]: Session 83 logged out. Waiting for processes to exit. Feb 9 12:57:26.334384 systemd-logind[1541]: Removed session 83. Feb 9 12:57:26.248000 audit[11402]: CRED_ACQ pid=11402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:26.431265 kernel: audit: type=1101 audit(1707483446.247:1005): pid=11402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:26.431302 kernel: audit: type=1103 audit(1707483446.248:1006): pid=11402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:26.431319 kernel: audit: type=1006 audit(1707483446.248:1007): pid=11402 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=83 res=1 Feb 9 12:57:26.489917 kernel: audit: type=1300 audit(1707483446.248:1007): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaa9c5500 a2=3 a3=0 items=0 ppid=1 pid=11402 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:26.248000 audit[11402]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaa9c5500 a2=3 a3=0 items=0 ppid=1 pid=11402 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:26.581952 kernel: audit: type=1327 audit(1707483446.248:1007): proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:26.248000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:26.612473 kernel: audit: type=1105 audit(1707483446.253:1008): pid=11402 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:26.253000 audit[11402]: USER_START pid=11402 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:26.706984 kernel: audit: type=1103 audit(1707483446.253:1009): pid=11405 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:26.253000 audit[11405]: CRED_ACQ pid=11405 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:26.796244 kernel: audit: type=1106 audit(1707483446.332:1010): pid=11402 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:26.332000 audit[11402]: USER_END pid=11402 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:26.891799 kernel: audit: type=1104 audit(1707483446.332:1011): pid=11402 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:26.332000 audit[11402]: CRED_DISP pid=11402 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:26.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.91.169:22-147.75.109.163:37642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:31.338706 systemd[1]: Started sshd@85-139.178.91.169:22-147.75.109.163:37646.service. Feb 9 12:57:31.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.91.169:22-147.75.109.163:37646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:31.365506 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:57:31.365581 kernel: audit: type=1130 audit(1707483451.338:1013): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.91.169:22-147.75.109.163:37646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:31.476000 audit[11469]: USER_ACCT pid=11469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:31.476889 sshd[11469]: Accepted publickey for core from 147.75.109.163 port 37646 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:57:31.477689 sshd[11469]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:57:31.480096 systemd-logind[1541]: New session 84 of user core. Feb 9 12:57:31.480711 systemd[1]: Started session-84.scope. Feb 9 12:57:31.557753 sshd[11469]: pam_unix(sshd:session): session closed for user core Feb 9 12:57:31.559116 systemd[1]: sshd@85-139.178.91.169:22-147.75.109.163:37646.service: Deactivated successfully. Feb 9 12:57:31.559808 systemd[1]: session-84.scope: Deactivated successfully. Feb 9 12:57:31.559814 systemd-logind[1541]: Session 84 logged out. Waiting for processes to exit. Feb 9 12:57:31.560276 systemd-logind[1541]: Removed session 84. Feb 9 12:57:31.477000 audit[11469]: CRED_ACQ pid=11469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:31.659091 kernel: audit: type=1101 audit(1707483451.476:1014): pid=11469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:31.659126 kernel: audit: type=1103 audit(1707483451.477:1015): pid=11469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:31.659145 kernel: audit: type=1006 audit(1707483451.477:1016): pid=11469 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=84 res=1 Feb 9 12:57:31.717884 kernel: audit: type=1300 audit(1707483451.477:1016): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffc8c5920 a2=3 a3=0 items=0 ppid=1 pid=11469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:31.477000 audit[11469]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffc8c5920 a2=3 a3=0 items=0 ppid=1 pid=11469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:31.809904 kernel: audit: type=1327 audit(1707483451.477:1016): proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:31.477000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:31.840387 kernel: audit: type=1105 audit(1707483451.482:1017): pid=11469 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:31.482000 audit[11469]: USER_START pid=11469 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:31.934880 kernel: audit: type=1103 audit(1707483451.483:1018): pid=11472 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:31.483000 audit[11472]: CRED_ACQ pid=11472 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:32.024139 kernel: audit: type=1106 audit(1707483451.557:1019): pid=11469 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:31.557000 audit[11469]: USER_END pid=11469 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:32.119688 kernel: audit: type=1104 audit(1707483451.557:1020): pid=11469 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:31.557000 audit[11469]: CRED_DISP pid=11469 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:31.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.91.169:22-147.75.109.163:37646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:36.564690 systemd[1]: Started sshd@86-139.178.91.169:22-147.75.109.163:49248.service. Feb 9 12:57:36.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.91.169:22-147.75.109.163:49248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:36.591708 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:57:36.591791 kernel: audit: type=1130 audit(1707483456.564:1022): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.91.169:22-147.75.109.163:49248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:36.701000 audit[11497]: USER_ACCT pid=11497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:36.702428 sshd[11497]: Accepted publickey for core from 147.75.109.163 port 49248 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:57:36.703702 sshd[11497]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:57:36.706083 systemd-logind[1541]: New session 85 of user core. Feb 9 12:57:36.706663 systemd[1]: Started session-85.scope. Feb 9 12:57:36.786895 sshd[11497]: pam_unix(sshd:session): session closed for user core Feb 9 12:57:36.788255 systemd[1]: sshd@86-139.178.91.169:22-147.75.109.163:49248.service: Deactivated successfully. Feb 9 12:57:36.788927 systemd[1]: session-85.scope: Deactivated successfully. Feb 9 12:57:36.788942 systemd-logind[1541]: Session 85 logged out. Waiting for processes to exit. Feb 9 12:57:36.789469 systemd-logind[1541]: Removed session 85. Feb 9 12:57:36.703000 audit[11497]: CRED_ACQ pid=11497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:36.886950 kernel: audit: type=1101 audit(1707483456.701:1023): pid=11497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:36.887000 kernel: audit: type=1103 audit(1707483456.703:1024): pid=11497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:36.887017 kernel: audit: type=1006 audit(1707483456.703:1025): pid=11497 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=85 res=1 Feb 9 12:57:36.703000 audit[11497]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8c14cf60 a2=3 a3=0 items=0 ppid=1 pid=11497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:37.037694 kernel: audit: type=1300 audit(1707483456.703:1025): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8c14cf60 a2=3 a3=0 items=0 ppid=1 pid=11497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:37.037729 kernel: audit: type=1327 audit(1707483456.703:1025): proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:36.703000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:37.068144 kernel: audit: type=1105 audit(1707483456.708:1026): pid=11497 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:36.708000 audit[11497]: USER_START pid=11497 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:37.162592 kernel: audit: type=1103 audit(1707483456.709:1027): pid=11500 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:36.709000 audit[11500]: CRED_ACQ pid=11500 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:37.251743 kernel: audit: type=1106 audit(1707483456.787:1028): pid=11497 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:36.787000 audit[11497]: USER_END pid=11497 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:37.347208 kernel: audit: type=1104 audit(1707483456.787:1029): pid=11497 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:36.787000 audit[11497]: CRED_DISP pid=11497 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:36.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.91.169:22-147.75.109.163:49248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:41.793978 systemd[1]: Started sshd@87-139.178.91.169:22-147.75.109.163:49260.service. Feb 9 12:57:41.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.91.169:22-147.75.109.163:49260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:41.820952 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:57:41.821006 kernel: audit: type=1130 audit(1707483461.793:1031): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.91.169:22-147.75.109.163:49260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:41.931000 audit[11523]: USER_ACCT pid=11523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:41.932468 sshd[11523]: Accepted publickey for core from 147.75.109.163 port 49260 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:57:41.933895 sshd[11523]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:57:41.936851 systemd-logind[1541]: New session 86 of user core. Feb 9 12:57:41.937388 systemd[1]: Started session-86.scope. Feb 9 12:57:42.017247 sshd[11523]: pam_unix(sshd:session): session closed for user core Feb 9 12:57:42.018668 systemd[1]: sshd@87-139.178.91.169:22-147.75.109.163:49260.service: Deactivated successfully. Feb 9 12:57:42.019257 systemd[1]: session-86.scope: Deactivated successfully. Feb 9 12:57:42.019269 systemd-logind[1541]: Session 86 logged out. Waiting for processes to exit. Feb 9 12:57:42.019776 systemd-logind[1541]: Removed session 86. Feb 9 12:57:41.933000 audit[11523]: CRED_ACQ pid=11523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:42.115952 kernel: audit: type=1101 audit(1707483461.931:1032): pid=11523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:42.115985 kernel: audit: type=1103 audit(1707483461.933:1033): pid=11523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:42.116009 kernel: audit: type=1006 audit(1707483461.933:1034): pid=11523 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=86 res=1 Feb 9 12:57:42.174540 kernel: audit: type=1300 audit(1707483461.933:1034): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea63cffc0 a2=3 a3=0 items=0 ppid=1 pid=11523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:41.933000 audit[11523]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea63cffc0 a2=3 a3=0 items=0 ppid=1 pid=11523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:42.266478 kernel: audit: type=1327 audit(1707483461.933:1034): proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:41.933000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:42.296941 kernel: audit: type=1105 audit(1707483461.939:1035): pid=11523 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:41.939000 audit[11523]: USER_START pid=11523 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:42.391317 kernel: audit: type=1103 audit(1707483461.939:1036): pid=11526 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:41.939000 audit[11526]: CRED_ACQ pid=11526 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:42.480497 kernel: audit: type=1106 audit(1707483462.017:1037): pid=11523 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:42.017000 audit[11523]: USER_END pid=11523 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:42.575917 kernel: audit: type=1104 audit(1707483462.017:1038): pid=11523 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:42.017000 audit[11523]: CRED_DISP pid=11523 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:42.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.91.169:22-147.75.109.163:49260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:47.020470 systemd[1]: Started sshd@88-139.178.91.169:22-147.75.109.163:36802.service. Feb 9 12:57:47.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.91.169:22-147.75.109.163:36802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:47.047404 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:57:47.047490 kernel: audit: type=1130 audit(1707483467.020:1040): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.91.169:22-147.75.109.163:36802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:47.157000 audit[11550]: USER_ACCT pid=11550 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:47.157878 sshd[11550]: Accepted publickey for core from 147.75.109.163 port 36802 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:57:47.160688 sshd[11550]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:57:47.163000 systemd-logind[1541]: New session 87 of user core. Feb 9 12:57:47.163428 systemd[1]: Started session-87.scope. Feb 9 12:57:47.240204 sshd[11550]: pam_unix(sshd:session): session closed for user core Feb 9 12:57:47.241553 systemd[1]: sshd@88-139.178.91.169:22-147.75.109.163:36802.service: Deactivated successfully. Feb 9 12:57:47.242150 systemd-logind[1541]: Session 87 logged out. Waiting for processes to exit. Feb 9 12:57:47.242206 systemd[1]: session-87.scope: Deactivated successfully. Feb 9 12:57:47.242767 systemd-logind[1541]: Removed session 87. Feb 9 12:57:47.160000 audit[11550]: CRED_ACQ pid=11550 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:47.339664 kernel: audit: type=1101 audit(1707483467.157:1041): pid=11550 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:47.339698 kernel: audit: type=1103 audit(1707483467.160:1042): pid=11550 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:47.339718 kernel: audit: type=1006 audit(1707483467.160:1043): pid=11550 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=87 res=1 Feb 9 12:57:47.398289 kernel: audit: type=1300 audit(1707483467.160:1043): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc38313890 a2=3 a3=0 items=0 ppid=1 pid=11550 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:47.160000 audit[11550]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc38313890 a2=3 a3=0 items=0 ppid=1 pid=11550 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:47.490195 kernel: audit: type=1327 audit(1707483467.160:1043): proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:47.160000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:47.520639 kernel: audit: type=1105 audit(1707483467.165:1044): pid=11550 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:47.165000 audit[11550]: USER_START pid=11550 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:47.615151 kernel: audit: type=1103 audit(1707483467.165:1045): pid=11553 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:47.165000 audit[11553]: CRED_ACQ pid=11553 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:47.704283 kernel: audit: type=1106 audit(1707483467.240:1046): pid=11550 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:47.240000 audit[11550]: USER_END pid=11550 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:47.799723 kernel: audit: type=1104 audit(1707483467.240:1047): pid=11550 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:47.240000 audit[11550]: CRED_DISP pid=11550 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:47.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.91.169:22-147.75.109.163:36802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:52.247102 systemd[1]: Started sshd@89-139.178.91.169:22-147.75.109.163:36818.service. Feb 9 12:57:52.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.91.169:22-147.75.109.163:36818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:52.273666 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:57:52.273705 kernel: audit: type=1130 audit(1707483472.246:1049): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.91.169:22-147.75.109.163:36818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:52.383000 audit[11601]: USER_ACCT pid=11601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:52.384426 sshd[11601]: Accepted publickey for core from 147.75.109.163 port 36818 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:57:52.385979 sshd[11601]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:57:52.388315 systemd-logind[1541]: New session 88 of user core. Feb 9 12:57:52.388917 systemd[1]: Started session-88.scope. Feb 9 12:57:52.467355 sshd[11601]: pam_unix(sshd:session): session closed for user core Feb 9 12:57:52.468818 systemd[1]: sshd@89-139.178.91.169:22-147.75.109.163:36818.service: Deactivated successfully. Feb 9 12:57:52.469400 systemd-logind[1541]: Session 88 logged out. Waiting for processes to exit. Feb 9 12:57:52.469482 systemd[1]: session-88.scope: Deactivated successfully. Feb 9 12:57:52.470053 systemd-logind[1541]: Removed session 88. Feb 9 12:57:52.385000 audit[11601]: CRED_ACQ pid=11601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:52.568476 kernel: audit: type=1101 audit(1707483472.383:1050): pid=11601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:52.568515 kernel: audit: type=1103 audit(1707483472.385:1051): pid=11601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:52.568530 kernel: audit: type=1006 audit(1707483472.385:1052): pid=11601 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=88 res=1 Feb 9 12:57:52.627077 kernel: audit: type=1300 audit(1707483472.385:1052): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff17238b50 a2=3 a3=0 items=0 ppid=1 pid=11601 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:52.385000 audit[11601]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff17238b50 a2=3 a3=0 items=0 ppid=1 pid=11601 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:52.719145 kernel: audit: type=1327 audit(1707483472.385:1052): proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:52.385000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:52.749586 kernel: audit: type=1105 audit(1707483472.390:1053): pid=11601 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:52.390000 audit[11601]: USER_START pid=11601 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:52.844145 kernel: audit: type=1103 audit(1707483472.391:1054): pid=11604 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:52.391000 audit[11604]: CRED_ACQ pid=11604 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:52.933331 kernel: audit: type=1106 audit(1707483472.467:1055): pid=11601 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:52.467000 audit[11601]: USER_END pid=11601 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:53.028762 kernel: audit: type=1104 audit(1707483472.467:1056): pid=11601 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:52.467000 audit[11601]: CRED_DISP pid=11601 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:52.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.91.169:22-147.75.109.163:36818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:57.474150 systemd[1]: Started sshd@90-139.178.91.169:22-147.75.109.163:46964.service. Feb 9 12:57:57.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.91.169:22-147.75.109.163:46964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:57.501025 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:57:57.501073 kernel: audit: type=1130 audit(1707483477.473:1058): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.91.169:22-147.75.109.163:46964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:57:57.610000 audit[11655]: USER_ACCT pid=11655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:57.611386 sshd[11655]: Accepted publickey for core from 147.75.109.163 port 46964 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:57:57.612662 sshd[11655]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:57:57.614933 systemd-logind[1541]: New session 89 of user core. Feb 9 12:57:57.615461 systemd[1]: Started session-89.scope. Feb 9 12:57:57.695581 sshd[11655]: pam_unix(sshd:session): session closed for user core Feb 9 12:57:57.697015 systemd[1]: sshd@90-139.178.91.169:22-147.75.109.163:46964.service: Deactivated successfully. Feb 9 12:57:57.697802 systemd[1]: session-89.scope: Deactivated successfully. Feb 9 12:57:57.697823 systemd-logind[1541]: Session 89 logged out. Waiting for processes to exit. Feb 9 12:57:57.698375 systemd-logind[1541]: Removed session 89. Feb 9 12:57:57.612000 audit[11655]: CRED_ACQ pid=11655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:57.796688 kernel: audit: type=1101 audit(1707483477.610:1059): pid=11655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:57.796731 kernel: audit: type=1103 audit(1707483477.612:1060): pid=11655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:57.796751 kernel: audit: type=1006 audit(1707483477.612:1061): pid=11655 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=89 res=1 Feb 9 12:57:57.855309 kernel: audit: type=1300 audit(1707483477.612:1061): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0343d6b0 a2=3 a3=0 items=0 ppid=1 pid=11655 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:57.612000 audit[11655]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0343d6b0 a2=3 a3=0 items=0 ppid=1 pid=11655 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:57:57.947298 kernel: audit: type=1327 audit(1707483477.612:1061): proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:57.612000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:57:57.977745 kernel: audit: type=1105 audit(1707483477.617:1062): pid=11655 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:57.617000 audit[11655]: USER_START pid=11655 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:58.072224 kernel: audit: type=1103 audit(1707483477.617:1063): pid=11658 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:57.617000 audit[11658]: CRED_ACQ pid=11658 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:58.161468 kernel: audit: type=1106 audit(1707483477.695:1064): pid=11655 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:57.695000 audit[11655]: USER_END pid=11655 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:58.256970 kernel: audit: type=1104 audit(1707483477.695:1065): pid=11655 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:57.695000 audit[11655]: CRED_DISP pid=11655 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:57:57.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.91.169:22-147.75.109.163:46964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:02.701736 systemd[1]: Started sshd@91-139.178.91.169:22-147.75.109.163:46968.service. Feb 9 12:58:02.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.91.169:22-147.75.109.163:46968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:02.728655 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:58:02.728721 kernel: audit: type=1130 audit(1707483482.701:1067): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.91.169:22-147.75.109.163:46968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:02.839000 audit[11721]: USER_ACCT pid=11721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:02.840342 sshd[11721]: Accepted publickey for core from 147.75.109.163 port 46968 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:58:02.841689 sshd[11721]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:58:02.844097 systemd-logind[1541]: New session 90 of user core. Feb 9 12:58:02.844612 systemd[1]: Started session-90.scope. Feb 9 12:58:02.841000 audit[11721]: CRED_ACQ pid=11721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:03.023911 kernel: audit: type=1101 audit(1707483482.839:1068): pid=11721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:03.023995 kernel: audit: type=1103 audit(1707483482.841:1069): pid=11721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:03.024013 kernel: audit: type=1006 audit(1707483482.841:1070): pid=11721 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=90 res=1 Feb 9 12:58:03.062057 sshd[11721]: pam_unix(sshd:session): session closed for user core Feb 9 12:58:03.063289 systemd[1]: sshd@91-139.178.91.169:22-147.75.109.163:46968.service: Deactivated successfully. Feb 9 12:58:03.063976 systemd[1]: session-90.scope: Deactivated successfully. Feb 9 12:58:03.063991 systemd-logind[1541]: Session 90 logged out. Waiting for processes to exit. Feb 9 12:58:03.064437 systemd-logind[1541]: Removed session 90. Feb 9 12:58:02.841000 audit[11721]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb452ff20 a2=3 a3=0 items=0 ppid=1 pid=11721 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:03.174595 kernel: audit: type=1300 audit(1707483482.841:1070): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb452ff20 a2=3 a3=0 items=0 ppid=1 pid=11721 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:03.174633 kernel: audit: type=1327 audit(1707483482.841:1070): proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:02.841000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:03.205053 kernel: audit: type=1105 audit(1707483482.846:1071): pid=11721 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:02.846000 audit[11721]: USER_START pid=11721 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:03.299517 kernel: audit: type=1103 audit(1707483482.846:1072): pid=11724 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:02.846000 audit[11724]: CRED_ACQ pid=11724 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:03.388747 kernel: audit: type=1106 audit(1707483483.062:1073): pid=11721 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:03.062000 audit[11721]: USER_END pid=11721 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:03.484283 kernel: audit: type=1104 audit(1707483483.062:1074): pid=11721 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:03.062000 audit[11721]: CRED_DISP pid=11721 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:03.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.91.169:22-147.75.109.163:46968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:08.068958 systemd[1]: Started sshd@92-139.178.91.169:22-147.75.109.163:36884.service. Feb 9 12:58:08.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.91.169:22-147.75.109.163:36884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:08.095988 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:58:08.096059 kernel: audit: type=1130 audit(1707483488.068:1076): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.91.169:22-147.75.109.163:36884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:08.206000 audit[11748]: USER_ACCT pid=11748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:08.207376 sshd[11748]: Accepted publickey for core from 147.75.109.163 port 36884 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:58:08.209666 sshd[11748]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:58:08.212084 systemd-logind[1541]: New session 91 of user core. Feb 9 12:58:08.212624 systemd[1]: Started session-91.scope. Feb 9 12:58:08.290595 sshd[11748]: pam_unix(sshd:session): session closed for user core Feb 9 12:58:08.292027 systemd[1]: sshd@92-139.178.91.169:22-147.75.109.163:36884.service: Deactivated successfully. Feb 9 12:58:08.292713 systemd[1]: session-91.scope: Deactivated successfully. Feb 9 12:58:08.292751 systemd-logind[1541]: Session 91 logged out. Waiting for processes to exit. Feb 9 12:58:08.293252 systemd-logind[1541]: Removed session 91. Feb 9 12:58:08.209000 audit[11748]: CRED_ACQ pid=11748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:08.389465 kernel: audit: type=1101 audit(1707483488.206:1077): pid=11748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:08.389504 kernel: audit: type=1103 audit(1707483488.209:1078): pid=11748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:08.389522 kernel: audit: type=1006 audit(1707483488.209:1079): pid=11748 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=91 res=1 Feb 9 12:58:08.448058 kernel: audit: type=1300 audit(1707483488.209:1079): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc48affd0 a2=3 a3=0 items=0 ppid=1 pid=11748 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:08.209000 audit[11748]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc48affd0 a2=3 a3=0 items=0 ppid=1 pid=11748 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:08.540061 kernel: audit: type=1327 audit(1707483488.209:1079): proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:08.209000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:08.570479 kernel: audit: type=1105 audit(1707483488.214:1080): pid=11748 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:08.214000 audit[11748]: USER_START pid=11748 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:08.664938 kernel: audit: type=1103 audit(1707483488.214:1081): pid=11751 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:08.214000 audit[11751]: CRED_ACQ pid=11751 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:08.754160 kernel: audit: type=1106 audit(1707483488.290:1082): pid=11748 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:08.290000 audit[11748]: USER_END pid=11748 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:08.849624 kernel: audit: type=1104 audit(1707483488.290:1083): pid=11748 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:08.290000 audit[11748]: CRED_DISP pid=11748 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:08.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.91.169:22-147.75.109.163:36884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:13.297311 systemd[1]: Started sshd@93-139.178.91.169:22-147.75.109.163:36898.service. Feb 9 12:58:13.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.91.169:22-147.75.109.163:36898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:13.324285 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:58:13.324339 kernel: audit: type=1130 audit(1707483493.297:1085): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.91.169:22-147.75.109.163:36898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:13.433000 audit[11774]: USER_ACCT pid=11774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:13.433897 sshd[11774]: Accepted publickey for core from 147.75.109.163 port 36898 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:58:13.434688 sshd[11774]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:58:13.437102 systemd-logind[1541]: New session 92 of user core. Feb 9 12:58:13.437680 systemd[1]: Started session-92.scope. Feb 9 12:58:13.524141 sshd[11774]: pam_unix(sshd:session): session closed for user core Feb 9 12:58:13.525520 systemd[1]: sshd@93-139.178.91.169:22-147.75.109.163:36898.service: Deactivated successfully. Feb 9 12:58:13.526153 systemd-logind[1541]: Session 92 logged out. Waiting for processes to exit. Feb 9 12:58:13.526164 systemd[1]: session-92.scope: Deactivated successfully. Feb 9 12:58:13.526625 systemd-logind[1541]: Removed session 92. Feb 9 12:58:13.434000 audit[11774]: CRED_ACQ pid=11774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:13.617993 kernel: audit: type=1101 audit(1707483493.433:1086): pid=11774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:13.618029 kernel: audit: type=1103 audit(1707483493.434:1087): pid=11774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:13.618045 kernel: audit: type=1006 audit(1707483493.434:1088): pid=11774 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=92 res=1 Feb 9 12:58:13.676573 kernel: audit: type=1300 audit(1707483493.434:1088): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb9cec1a0 a2=3 a3=0 items=0 ppid=1 pid=11774 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:13.434000 audit[11774]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb9cec1a0 a2=3 a3=0 items=0 ppid=1 pid=11774 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:13.768517 kernel: audit: type=1327 audit(1707483493.434:1088): proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:13.434000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:13.798949 kernel: audit: type=1105 audit(1707483493.439:1089): pid=11774 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:13.439000 audit[11774]: USER_START pid=11774 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:13.893476 kernel: audit: type=1103 audit(1707483493.439:1090): pid=11778 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:13.439000 audit[11778]: CRED_ACQ pid=11778 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:13.982579 kernel: audit: type=1106 audit(1707483493.524:1091): pid=11774 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:13.524000 audit[11774]: USER_END pid=11774 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:14.078025 kernel: audit: type=1104 audit(1707483493.524:1092): pid=11774 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:13.524000 audit[11774]: CRED_DISP pid=11774 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:13.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.91.169:22-147.75.109.163:36898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:18.530820 systemd[1]: Started sshd@94-139.178.91.169:22-147.75.109.163:43122.service. Feb 9 12:58:18.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.91.169:22-147.75.109.163:43122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:18.557898 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:58:18.557969 kernel: audit: type=1130 audit(1707483498.530:1094): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.91.169:22-147.75.109.163:43122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:18.669451 sshd[11803]: Accepted publickey for core from 147.75.109.163 port 43122 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:58:18.669000 audit[11803]: USER_ACCT pid=11803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:18.673692 sshd[11803]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:58:18.676237 systemd-logind[1541]: New session 93 of user core. Feb 9 12:58:18.676891 systemd[1]: Started session-93.scope. Feb 9 12:58:18.758811 sshd[11803]: pam_unix(sshd:session): session closed for user core Feb 9 12:58:18.760127 systemd[1]: sshd@94-139.178.91.169:22-147.75.109.163:43122.service: Deactivated successfully. Feb 9 12:58:18.760771 systemd-logind[1541]: Session 93 logged out. Waiting for processes to exit. Feb 9 12:58:18.760778 systemd[1]: session-93.scope: Deactivated successfully. Feb 9 12:58:18.761251 systemd-logind[1541]: Removed session 93. Feb 9 12:58:18.673000 audit[11803]: CRED_ACQ pid=11803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:18.851867 kernel: audit: type=1101 audit(1707483498.669:1095): pid=11803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:18.851913 kernel: audit: type=1103 audit(1707483498.673:1096): pid=11803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:18.851931 kernel: audit: type=1006 audit(1707483498.673:1097): pid=11803 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=93 res=1 Feb 9 12:58:18.910477 kernel: audit: type=1300 audit(1707483498.673:1097): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd94462140 a2=3 a3=0 items=0 ppid=1 pid=11803 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:18.673000 audit[11803]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd94462140 a2=3 a3=0 items=0 ppid=1 pid=11803 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:19.002370 kernel: audit: type=1327 audit(1707483498.673:1097): proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:18.673000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:19.032832 kernel: audit: type=1105 audit(1707483498.678:1098): pid=11803 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:18.678000 audit[11803]: USER_START pid=11803 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:19.127246 kernel: audit: type=1103 audit(1707483498.679:1099): pid=11808 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:18.679000 audit[11808]: CRED_ACQ pid=11808 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:19.216402 kernel: audit: type=1106 audit(1707483498.759:1100): pid=11803 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:18.759000 audit[11803]: USER_END pid=11803 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:19.311830 kernel: audit: type=1104 audit(1707483498.759:1101): pid=11803 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:18.759000 audit[11803]: CRED_DISP pid=11803 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:18.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.91.169:22-147.75.109.163:43122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:23.765274 systemd[1]: Started sshd@95-139.178.91.169:22-147.75.109.163:43130.service. Feb 9 12:58:23.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.91.169:22-147.75.109.163:43130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:23.792595 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:58:23.792663 kernel: audit: type=1130 audit(1707483503.765:1103): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.91.169:22-147.75.109.163:43130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:23.903000 audit[11870]: USER_ACCT pid=11870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:23.903881 sshd[11870]: Accepted publickey for core from 147.75.109.163 port 43130 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:58:23.904656 sshd[11870]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:58:23.906910 systemd-logind[1541]: New session 94 of user core. Feb 9 12:58:23.907423 systemd[1]: Started session-94.scope. Feb 9 12:58:23.985652 sshd[11870]: pam_unix(sshd:session): session closed for user core Feb 9 12:58:23.987058 systemd[1]: sshd@95-139.178.91.169:22-147.75.109.163:43130.service: Deactivated successfully. Feb 9 12:58:23.987913 systemd[1]: session-94.scope: Deactivated successfully. Feb 9 12:58:23.987955 systemd-logind[1541]: Session 94 logged out. Waiting for processes to exit. Feb 9 12:58:23.988406 systemd-logind[1541]: Removed session 94. Feb 9 12:58:23.904000 audit[11870]: CRED_ACQ pid=11870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:24.088070 kernel: audit: type=1101 audit(1707483503.903:1104): pid=11870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:24.088111 kernel: audit: type=1103 audit(1707483503.904:1105): pid=11870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:24.088128 kernel: audit: type=1006 audit(1707483503.904:1106): pid=11870 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=94 res=1 Feb 9 12:58:24.146704 kernel: audit: type=1300 audit(1707483503.904:1106): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe092a0720 a2=3 a3=0 items=0 ppid=1 pid=11870 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=94 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:23.904000 audit[11870]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe092a0720 a2=3 a3=0 items=0 ppid=1 pid=11870 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=94 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:24.238632 kernel: audit: type=1327 audit(1707483503.904:1106): proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:23.904000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:24.269074 kernel: audit: type=1105 audit(1707483503.909:1107): pid=11870 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:23.909000 audit[11870]: USER_START pid=11870 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:24.363470 kernel: audit: type=1103 audit(1707483503.909:1108): pid=11873 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:23.909000 audit[11873]: CRED_ACQ pid=11873 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:24.452574 kernel: audit: type=1106 audit(1707483503.985:1109): pid=11870 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:23.985000 audit[11870]: USER_END pid=11870 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:24.548118 kernel: audit: type=1104 audit(1707483503.985:1110): pid=11870 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:23.985000 audit[11870]: CRED_DISP pid=11870 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:23.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.91.169:22-147.75.109.163:43130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:28.988168 systemd[1]: Started sshd@96-139.178.91.169:22-147.75.109.163:35652.service. Feb 9 12:58:28.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.91.169:22-147.75.109.163:35652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:29.015216 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:58:29.015271 kernel: audit: type=1130 audit(1707483508.987:1112): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.91.169:22-147.75.109.163:35652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:29.126000 audit[11965]: USER_ACCT pid=11965 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:29.127413 sshd[11965]: Accepted publickey for core from 147.75.109.163 port 35652 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:58:29.128663 sshd[11965]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:58:29.131072 systemd-logind[1541]: New session 95 of user core. Feb 9 12:58:29.131617 systemd[1]: Started session-95.scope. Feb 9 12:58:29.208101 sshd[11965]: pam_unix(sshd:session): session closed for user core Feb 9 12:58:29.209465 systemd[1]: sshd@96-139.178.91.169:22-147.75.109.163:35652.service: Deactivated successfully. Feb 9 12:58:29.210127 systemd[1]: session-95.scope: Deactivated successfully. Feb 9 12:58:29.210158 systemd-logind[1541]: Session 95 logged out. Waiting for processes to exit. Feb 9 12:58:29.210731 systemd-logind[1541]: Removed session 95. Feb 9 12:58:29.128000 audit[11965]: CRED_ACQ pid=11965 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:29.309240 kernel: audit: type=1101 audit(1707483509.126:1113): pid=11965 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:29.309277 kernel: audit: type=1103 audit(1707483509.128:1114): pid=11965 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:29.309294 kernel: audit: type=1006 audit(1707483509.128:1115): pid=11965 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=95 res=1 Feb 9 12:58:29.367825 kernel: audit: type=1300 audit(1707483509.128:1115): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7985ee40 a2=3 a3=0 items=0 ppid=1 pid=11965 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=95 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:29.128000 audit[11965]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7985ee40 a2=3 a3=0 items=0 ppid=1 pid=11965 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=95 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:29.459753 kernel: audit: type=1327 audit(1707483509.128:1115): proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:29.128000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:29.490315 kernel: audit: type=1105 audit(1707483509.132:1116): pid=11965 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:29.132000 audit[11965]: USER_START pid=11965 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:29.584742 kernel: audit: type=1103 audit(1707483509.133:1117): pid=11968 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:29.133000 audit[11968]: CRED_ACQ pid=11968 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:29.673912 kernel: audit: type=1106 audit(1707483509.208:1118): pid=11965 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:29.208000 audit[11965]: USER_END pid=11965 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:29.769453 kernel: audit: type=1104 audit(1707483509.208:1119): pid=11965 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:29.208000 audit[11965]: CRED_DISP pid=11965 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:29.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.91.169:22-147.75.109.163:35652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:34.214584 systemd[1]: Started sshd@97-139.178.91.169:22-147.75.109.163:35654.service. Feb 9 12:58:34.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.91.169:22-147.75.109.163:35654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:34.240960 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:58:34.241029 kernel: audit: type=1130 audit(1707483514.214:1121): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.91.169:22-147.75.109.163:35654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:34.350000 audit[11990]: USER_ACCT pid=11990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:34.351437 sshd[11990]: Accepted publickey for core from 147.75.109.163 port 35654 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:58:34.354109 sshd[11990]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:58:34.356379 systemd-logind[1541]: New session 96 of user core. Feb 9 12:58:34.357025 systemd[1]: Started session-96.scope. Feb 9 12:58:34.435402 sshd[11990]: pam_unix(sshd:session): session closed for user core Feb 9 12:58:34.436889 systemd[1]: sshd@97-139.178.91.169:22-147.75.109.163:35654.service: Deactivated successfully. Feb 9 12:58:34.437688 systemd[1]: session-96.scope: Deactivated successfully. Feb 9 12:58:34.437748 systemd-logind[1541]: Session 96 logged out. Waiting for processes to exit. Feb 9 12:58:34.438311 systemd-logind[1541]: Removed session 96. Feb 9 12:58:34.353000 audit[11990]: CRED_ACQ pid=11990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:34.536621 kernel: audit: type=1101 audit(1707483514.350:1122): pid=11990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:34.536657 kernel: audit: type=1103 audit(1707483514.353:1123): pid=11990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:34.536678 kernel: audit: type=1006 audit(1707483514.353:1124): pid=11990 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=96 res=1 Feb 9 12:58:34.595225 kernel: audit: type=1300 audit(1707483514.353:1124): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf2053c50 a2=3 a3=0 items=0 ppid=1 pid=11990 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=96 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:34.353000 audit[11990]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf2053c50 a2=3 a3=0 items=0 ppid=1 pid=11990 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=96 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:34.687197 kernel: audit: type=1327 audit(1707483514.353:1124): proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:34.353000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:34.717645 kernel: audit: type=1105 audit(1707483514.358:1125): pid=11990 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:34.358000 audit[11990]: USER_START pid=11990 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:34.812066 kernel: audit: type=1103 audit(1707483514.359:1126): pid=11993 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:34.359000 audit[11993]: CRED_ACQ pid=11993 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:34.901345 kernel: audit: type=1106 audit(1707483514.435:1127): pid=11990 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:34.435000 audit[11990]: USER_END pid=11990 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:34.996832 kernel: audit: type=1104 audit(1707483514.435:1128): pid=11990 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:34.435000 audit[11990]: CRED_DISP pid=11990 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:34.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.91.169:22-147.75.109.163:35654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:39.441711 systemd[1]: Started sshd@98-139.178.91.169:22-147.75.109.163:35814.service. Feb 9 12:58:39.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.91.169:22-147.75.109.163:35814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:39.468902 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:58:39.468959 kernel: audit: type=1130 audit(1707483519.441:1130): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.91.169:22-147.75.109.163:35814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:39.579000 audit[12017]: USER_ACCT pid=12017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:39.579577 sshd[12017]: Accepted publickey for core from 147.75.109.163 port 35814 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:58:39.582779 sshd[12017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:58:39.585144 systemd-logind[1541]: New session 97 of user core. Feb 9 12:58:39.585574 systemd[1]: Started session-97.scope. Feb 9 12:58:39.662531 sshd[12017]: pam_unix(sshd:session): session closed for user core Feb 9 12:58:39.664003 systemd[1]: sshd@98-139.178.91.169:22-147.75.109.163:35814.service: Deactivated successfully. Feb 9 12:58:39.664622 systemd-logind[1541]: Session 97 logged out. Waiting for processes to exit. Feb 9 12:58:39.664636 systemd[1]: session-97.scope: Deactivated successfully. Feb 9 12:58:39.665132 systemd-logind[1541]: Removed session 97. Feb 9 12:58:39.582000 audit[12017]: CRED_ACQ pid=12017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:39.761478 kernel: audit: type=1101 audit(1707483519.579:1131): pid=12017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:39.761530 kernel: audit: type=1103 audit(1707483519.582:1132): pid=12017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:39.761549 kernel: audit: type=1006 audit(1707483519.582:1133): pid=12017 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=97 res=1 Feb 9 12:58:39.582000 audit[12017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd800476e0 a2=3 a3=0 items=0 ppid=1 pid=12017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=97 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:39.911912 kernel: audit: type=1300 audit(1707483519.582:1133): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd800476e0 a2=3 a3=0 items=0 ppid=1 pid=12017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=97 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:39.911943 kernel: audit: type=1327 audit(1707483519.582:1133): proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:39.582000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:39.942356 kernel: audit: type=1105 audit(1707483519.587:1134): pid=12017 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:39.587000 audit[12017]: USER_START pid=12017 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:40.036700 kernel: audit: type=1103 audit(1707483519.588:1135): pid=12020 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:39.588000 audit[12020]: CRED_ACQ pid=12020 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:40.125803 kernel: audit: type=1106 audit(1707483519.662:1136): pid=12017 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:39.662000 audit[12017]: USER_END pid=12017 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:40.221180 kernel: audit: type=1104 audit(1707483519.662:1137): pid=12017 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:39.662000 audit[12017]: CRED_DISP pid=12017 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:39.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.91.169:22-147.75.109.163:35814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:44.669638 systemd[1]: Started sshd@99-139.178.91.169:22-147.75.109.163:37306.service. Feb 9 12:58:44.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.91.169:22-147.75.109.163:37306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:44.696397 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 12:58:44.696479 kernel: audit: type=1130 audit(1707483524.669:1139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.91.169:22-147.75.109.163:37306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:58:44.806000 audit[12044]: USER_ACCT pid=12044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:44.807272 sshd[12044]: Accepted publickey for core from 147.75.109.163 port 37306 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:58:44.809698 sshd[12044]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:58:44.812466 systemd-logind[1541]: New session 98 of user core. Feb 9 12:58:44.813488 systemd[1]: Started session-98.scope. Feb 9 12:58:44.891053 sshd[12044]: pam_unix(sshd:session): session closed for user core Feb 9 12:58:44.892690 systemd[1]: sshd@99-139.178.91.169:22-147.75.109.163:37306.service: Deactivated successfully. Feb 9 12:58:44.893714 systemd-logind[1541]: Session 98 logged out. Waiting for processes to exit. Feb 9 12:58:44.893822 systemd[1]: session-98.scope: Deactivated successfully. Feb 9 12:58:44.894587 systemd-logind[1541]: Removed session 98. Feb 9 12:58:44.809000 audit[12044]: CRED_ACQ pid=12044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:44.989011 kernel: audit: type=1101 audit(1707483524.806:1140): pid=12044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:44.989056 kernel: audit: type=1103 audit(1707483524.809:1141): pid=12044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:44.989081 kernel: audit: type=1006 audit(1707483524.809:1142): pid=12044 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=98 res=1 Feb 9 12:58:45.047573 kernel: audit: type=1300 audit(1707483524.809:1142): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc9092630 a2=3 a3=0 items=0 ppid=1 pid=12044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=98 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:44.809000 audit[12044]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc9092630 a2=3 a3=0 items=0 ppid=1 pid=12044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=98 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:58:44.809000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:45.169956 kernel: audit: type=1327 audit(1707483524.809:1142): proctitle=737368643A20636F7265205B707269765D Feb 9 12:58:45.169995 kernel: audit: type=1105 audit(1707483524.815:1143): pid=12044 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:44.815000 audit[12044]: USER_START pid=12044 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:45.264475 kernel: audit: type=1103 audit(1707483524.815:1144): pid=12047 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:44.815000 audit[12047]: CRED_ACQ pid=12047 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:45.353600 kernel: audit: type=1106 audit(1707483524.891:1145): pid=12044 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:44.891000 audit[12044]: USER_END pid=12044 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:45.449017 kernel: audit: type=1104 audit(1707483524.891:1146): pid=12044 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:44.891000 audit[12044]: CRED_DISP pid=12044 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:58:44.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.91.169:22-147.75.109.163:37306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'